Blog

Avoid VoIP eavesdropping with these tricks

As of late, eavesdropping has been making the headlines due to the surge in frequency. Making it an ideal time to review how well your Voice-over-Internet-Protocol (VoIP) phone systems are protected. However, this isn’t entirely new to VoIP, Vomit and Peskyspy are just some of the prolific VoIP eavesdropping attacks that have gained infamy since 2007. Spare your business from VoIP eavesdropping with these tips:

Never deploy with default configurations
Everyone wants to get things rolling as quickly as possible, but this often results in VoIP phones being deployed with their default configurations.

Homographs: the newest trend in phishing

So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up.

Hands-on virtualization with a 1990s Mac

Even if virtualization has been explained to you before, it's entirely possible that the definition didn’t stick. There are so many variations of this technology that we take it upon ourselves to periodically review its most basic functions. And because these variations aren't concrete enough to easily understand them, this time we’re including a virtualized desktop for you to play with!
What is virtualization?
The simplest definition is this: It’s the act of creating a virtual (rather than physical) version of something, including hardware platforms, storage devices, and computer network resources.

AI-based productivity coaching from O365

It seems like every quarter Office 365 is adding a new service that totally changes the way we do business. As we settle into 2017, Microsoft is granting businesses a machine learning-based tool for getting more out of your employee’s work day.
What is MyAnalytics?
Microsoft’s newest productivity offering is all about applying machine learning technology to your employees’ Office 365 data.