Blog
WannaCry: A historic cyberattack
No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign
How to defend against WannaCry
Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions earlier this
What to look for in a VoIP distributor
With a quick Google search, numerous VoIP distributors instantly appear. The problem is knowing whether they will meet your business’s needs. To attract consumers, these
More security features for Office 365
Microsoft has commercially released new products and upgrades that will secure company information. The threat intelligence and data governance features are designed for businesses that
The most advanced Gmail phishing scam yet
As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their
Microsoft Word bug: What you need to know
Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to
The phishing craze that’s blindsiding users
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users
Ransomware traps Skype users with fake ads
Skype has made many improvements to become the go-to audio and video communication tool. But as more people turn to Skype to conduct their business,
Enhance customer service through video chat
Online video chat turns stiff customer service interactions into a more personal experience. Seeing the person you’re talking to makes for a more substantial conversation.
Updated Microsoft Teams is set for release
Preceding its general availability, Microsoft has recently rolled out a major update for Microsoft Teams — Window’s version of the cloud-based team collaboration tool, Slack.
Some ransomware strains are free to decrypt
Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from
Networks: Software-defined vs virtualized
If knowing is half the battle, virtualization is one for the ages. With more than a decade of history, it’s a tough topic that business