Blog

Watch out for this persuasive phishing email

Anglers catch fish by dangling bait in front of their victims, and hackers use the same strategy to trick your employees. There’s a new phishing scam making the rounds and the digital bait is almost impossible to distinguish from the real thing. Here are the three things to watch out for in Office 365 scams.

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful.

Upgrading to a dual monitor system

Small businesses are always searching for ways for their employees to be more effective computer users. But before you go out and buy bigger hard drives and faster processors, you should consider upgrading your desktops to a dual monitor system. Read on to find out about the advantages of using two monitors per desktop.

Ways to handle virtualization security risks

Online blogs and forums mostly cover networks and the cloud when it comes to cybersecurity, leaving other types of technology -- particularly virtualization -- overlooked and unsecured. If you don’t have the right defense plans in place, your business will be vulnerable to all types of cyberthreats.

Getting ready to switch to VoIP phones

Voice over Internet Protocol, commonly known as VoIP, allows you and your employees to make and take phone calls over the Internet using your existing broadband connection. It saves you loads of money and increases team efficiency. If you’re considering moving to a VoIP solution, here are some of the most important aspects to address before the switch.

New Spectre-style attack discovered

Security experts are constantly discovering new potential threats, and quite recently, they’ve found a new type of Spectre-style attack more dangerous than the original. Here’s a quick rundown of the new Spectre variant.

Spectre 101
For those who don’t know, Spectre is a vulnerability in modern computer chips like Intel and AMD that allows hackers to steal confidential information stored in an application’s memory, including passwords, instant messages, and emails.

Server Administration 101: Temperature

Servers are the heart of most modern SMBs.  And with the strain that most businesses put on their servers, one of the most important maintenance variables is temperature management. Understanding why keeping your servers cool is vitally important and could save you from an expensive crash, troubling data loss, or reduced hardware reliability.