Blog

How Outlook’s update Improves User Experience

When it comes to the communications tools you use in your business, there may be many opportunities to improve the process that you have not yet explored. Microsoft Outlook has made improving your use of communications technology even easier with its latest changes and updates. If you want to make the most of the new […]

500 Million Yahoo Users Affected by Data Breach – Password Change Recommended

Source: Trend Micro

Yahoo has confirmed a massive breach that compromised the personal information of 500 million of its users, affecting account holders of Yahoo Mail, Yahoo Finance, Yahoo Fantasy Sports, and Flickr. The tech giant was quick to issue a plan of action, with Yahoo chief information security officer Bob Lord posting an announcement on Tumblr on September 22. The post outlines the investigation, a protection plan, and security recommendations.

$400k Defrauded; Cyberattacked; Expensive Lessons; Don’t Let it Happen to You!

Source: verneharnish.typepad.com

Defrauded $400k -- it was a bad night last night, finding out that Gazelles was cyber-attacked and $400k was cleverly "taken" from our Gazelles bank account, more below, but first...

Why Drucker is Still Relevant -- Hermann Simon, a dear friend of the late Peter Drucker, wrote an insightful piece in HRB this week titled "Why Peter Drucker's Writing Still Feels So Relevant.

Microsoft releases patches for Windows 10

Windows 10 may be widely regarded as a massive improvement on Windows 8, but Microsoft’s latest operating system has its share of imperfections as well. Fortunately, Microsoft has issued important patches to remedy security vulnerabilities, problems with the Windows store crashing, and a myriad of other issues. Read on for more information about the flaws […]

Understanding virtualization containers

The evolution of software containers has changed the way virtual computing is realized. It has diminished the risks of malware and the trouble of portability by allowing software vendors to package their products into virtual containers that can run from any desktop machine, regardless of hardware of operating system. Read on for our review of […]

Is two-step authentication the only way?

With all the recent hacking scares all over the world, you know and understand that your cyber security and your business’s cyber security are extremely important. However, when it comes to authentication processes, you may not be sure what the real deal is. There are two seemingly similar types of authentication that are often confused. […]

Why Telephony and VoIP attacks continue

If there’s one constant in the field of cyber-security, it’s that hackers will never stop looking for new ways to hurt your business. In the most recent development, they’ve set their sights on Voice over Internet Protocol (VoIP) systems. Technology administrators for hospitals, government entities, and small businesses need to be on alert for the […]

How Google is changing WiFi

Having access to high-speed internet is important for people who work, chat, or stream online. Sadly, most WiFi systems are unreliable and unresponsive, and depending on the layout of your office, they can create internet dead zones. For businesses that manage most of their tasks online, this simply won’t do. Ideally, internet connections should be […]

Apple is set to improve cloud applications

The process of moving particular elements of the iTunes Store, Siri and Apple News to a secretive service known only as Pie has already begun, with more services such as iCloud and Project McQueen getting the same treatment in the coming years. Apple has said that bringing these teams together can improve its current cloud […]