Blog

Hackers exploit vulnerable Office feature

Hackers exploit vulnerable Office feature

As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen. What’s the new Office threat? […]

Mobile devices and HIPAA compliance

Mobile devices and HIPAA compliance

Mobile devices have revolutionized the healthcare industry: They’re convenient and significantly improve work efficiency and patients’ satisfaction. Yet they also come with risks. Patient data handled by those devices can be leaked. That’s why every healthcare provider needs to be extra careful about data security when using mobile devices. Why does data security matter so […]

KRACK hacks: What you need to know

KRACK hacks: What you need to know

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK. What is KRACK? Simply […]

How does Apple Pay work and is it secure?

How does Apple Pay work and is it secure?

Apple Pay is a way for iPhone and iWatch users to make credit card payments using only their mobile device. Although it’s incredibly simple to use, some small businesses are worried about whether accepting these digital payments will add to their data security burdens. However, once you understand how it works, you’ll see just how […]

Cisco introduces new AI services

Cisco introduces new AI services

Modern IT systems are generating more data than ever before, and humans can’t keep up. Thankfully, certain tasks have already been offloaded to machines. Even better, Cisco may have a long-term solution to IT management complexities. Artificial intelligence (AI) and machine learning are extremely useful in helping us sift through massive amounts of information, and […]

Here comes Dropbox Professional

Here comes Dropbox Professional

Lack of storage space is something we all have to deal with at some point. You’ll be forced to delete some seemingly unnecessary files, only to find out that you actually needed them later. What would you do? Dropbox offers a quick fix with its new Professional plan. Read on to learn more. Stop worrying […]

Guest Wi-Fi 101

Guest Wi-Fi 101

No matter who they are, people today expect Wi-Fi access when they’re guests of your office. Setting up your Wi-Fi the wrong way can create a tedious experience for them and even expose your confidential information. So what’s the right way to do it? Never give guests access to your primary Wi-Fi While giving guests […]

Microsoft Edge goes mobile

Microsoft Edge goes mobile

Microsoft Edge is a great browser — it’s fast, clean, and has every feature you need. But alas, few people use it. So in an attempt to encourage PC users who also own an Android or iOS device to use Edge, the company is moving the browser to mobile platforms. Read on for more details. […]

Office 2019 is on its way

Office 2019 is on its way

As a convenient cloud solution, Office 365 boasts nearly 30 million users. But that’s nothing compared to licensed versions of Microsoft’s productivity suite, which have more than one billion users. Office 2019 was announced in September and it will mean big changes for businesses that want simpler versions of Word, PowerPoint, Excel and more. Microsoft […]

Re-secure your passwords!

Re-secure your passwords!

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. Now retired, the author admits that his document was misguided. Find out why and what great passwords are made of. The problem The issue isn’t necessarily that NIST […]