Blog

Windows 10’s useful new updates

In case you’re wondering what Creators Update is and how it differs from a regular update, it’s Microsoft’s name for Windows 10’s latest features. Microsoft no longer offers Windows 10 upgrades for free, but these latest updates are. Aside from notable design enhancements and user experience, Windows 10 users can anticipate the Creators Update for […]

Homographs: the newest trend in phishing

So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up. Read on to […]

Back up your mobile devices now

Mobile phones’ sizes and styles went through massive changes in the last few years. And as their looks and dimensions changed, so did their functions. With better capacity and bigger storage, mobile phones turned into veritable mini-computers that businesses were quick to adopt as a vital office tool. Naturally, hackers got the memo. With new […]

Are you using this WordPress checklist yet?

Many would initially blame hackers for an extremely slow website or being delisted from search engines, but that’s not always the case. When it comes to managing your website, how sure are you that all your bases are covered? If you are unsure, you might want to give this WordPress maintenance checklist a try. Make […]

Hands-on virtualization with a 1990s Mac

Even if virtualization has been explained to you before, it’s entirely possible that the definition didn’t stick. There are so many variations of this technology that we take it upon ourselves to periodically review its most basic functions. And because these variations aren’t concrete enough to easily understand them, this time we’re including a virtualized […]

Fake Skype ads lead to ransomware attacks

Hackers have used Skype to conduct various phone scams; but this month, they have found a new way to exploit the popular video calling app. Ransomware, which has predominantly been distributed via email attachments and URL links, is now being delivered through fake Skype ads. The details below will help you avoid business-crippling ransomware. Initial […]

Microsoft’s docs.com: possible data breach

It was recently revealed that docs.com, Microsoft’s free document-sharing platform, was posting private documents to the public. Although there are Office 365 users who are perfectly aware of how the program works and have no qualms about publicly sharing their documents, hundreds of other users are not. Since docs.com is essentially a document-sharing website, can […]

Why you should review social media policies

With more and more social media platforms popping up all the time, it can be tough to keep track of social media policies and assess their effectiveness. However, if you fail to review them annually, your employees might get so obsessed with what’s trending on Twitter that they miss their deadlines. That would impact productivity […]

Windows Vista is due to leave Microsoft

It’s official. Microsoft is finally letting go of its 10-year-old, often criticized operating system: Windows Vista. From April 11th onwards, the tech company will officially end support for Vista, meaning customers will be deprived of crucial security and software updates. What does this mean for your small- or medium-sized business? Read on to find out […]