Stay on the line with a VoIP continuity plan

Stay on the line with a VoIP continuity plan

Voice over IP (VoIP) phone systems offer far superior mobility, functionality, and cost-efficiency than traditional landlines. But like any computer system, it can be vulnerable to service disruptions, equipment failure, and cyberattacks. With proper preparation, however, your phone systems can weather any disaster.

New phishing scam targets Office 365 users

New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that’s even more difficult to identify.

Apple released a new iPhone and so much more!

Apple released a new iPhone and so much more!

10 years after the first iPhone was announced, Apple’s keynote addresses are still global events. This year’s slate of fall releases included a lot more than incremental updates to the company’s flagship device. Regardless of whether your next Apple purchase is coming out of a personal or company budget, you’ll want to know what’s new.

Is your business ready for hurricane season?

Is your business ready for hurricane season?

In late August 2017, Hurricane Harvey caused widespread power outages and floods across Texas and certain parts of Louisiana. Weeks later, Hurricane Irma hit the coast, affecting Florida, Georgia, and South Carolina businesses. Now, experts are saying there are more storms to come, which is why you need a good disaster recovery (DR) plan that has you prepared for the worst.

Facebook faces devious adware

Facebook faces devious adware

When you receive an email from an unfamiliar source urging you to click on a link or download a file, it’s easy to send it straight to the bin due to its spam-like nature. It’s a completely different story when the message is sent via Facebook Messenger by one of your friends.

Watch out! More ransomware attacks incoming

Watch out! More ransomware attacks incoming

Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks.

New Locky ransomware: what you need to know

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.

Spyware has been infecting Macs for years

Spyware has been infecting Macs for years

While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the malware gets into Mac computers.

How Amazon AppStream 2.0 can help businesses

How Amazon AppStream 2.0 can help businesses

Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service.

Black and white: Not all hackers are bad

Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.