It’s hard to say exactly why so many businesses fail to take computer security seriously. There are many factors in play, such as the false feeling of security many Mac users have felt over the years, thinking they were more secure than PC and Windows users by default. But, the most common reason for the […]
When was the last time you performed a risk assessment of your computer network? Or evaluated the security of your personal, networked devices? An analysis of more than 212,000 Cisco networking devices at 350 organizations across North America found that 73 percent of businesses have end-of-life devices (those no longer being sold or supported) operating […]
Apple released a statement regarding the security content of iOS 10.1 on October 24 which breaks down the various security-flaw patches relating to Apple iOS 10 facets and apps the platform contains or works with. The statement centers on Apple security updates and references the iPhone, iPad, or iPod versions the patches are available for, […]
Don’t upgrade your mobile device to Apple iOS 10 just yet if you prefer PPTP connections for VPN. Apple iOS 10 does not support PPTP VPN connections nor will the pass-through work whilst tethering off a phone. This is the VPN method many use to access their systems externally, especially for Windows users, so for […]
These days, most of your business likely exists in a purely digital format. The software, applications, and data that make up the bulk of your daily tasks and interactions with clients are created and stored on computers and servers. This offers a level of organization and ease of access that lets your staff work efficiently, […]
Last month a new ransomware strain appeared called “Cry” or “CryLocker,” which uses PNG, or Portable Network Graphic image files to record target users’ information such as the encrypted files themselves, as well as their location, and then uploads an image of this data to an album on image-sharing sites such as Imgur.com. CryLocker was […]
Configuring a mapped network drive to connect to SharePoint Online is a quick and easy way to use Windows Explorer to drag files into libraries, create folders, move and copy files, and delete multiple files at the same time. There are a few steps you’ll need to go through to get SharePoint set up, and […]
When you speak to your IT partner, security is generally one of the first topics that will come up. And with good reason. If your business isn’t properly protected against outside threats, you stand to lose everything. Downtime doesn’t just result in a momentary loss of productivity; it often leads to a snowball effect that […]
A lot of Managed Service Providers like to talk about the value they can offer your business, without ever really explaining what that value is. Is it a dollar value? A strategic value? Is it both of these things? Neither of them? You shouldn’t be left guessing at what your business is buying in to. […]
The IT security industry has been forced to adopt a reactive stance when it comes to the latest threats. Security vendors are constantly rushing to develop, test, and deploy new products in response to the most recent problem. And while they are succeeding, not everyone reaps the same benefits. Large businesses and corporations have several […]