Blog

Office 365 threat comes with new techniques

Office 365 threat comes with new techniques

If you’re using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users’ credentials and attack organizations internally. Get yourself informed and read on.

DR tips for floods and hurricanes

DR tips for floods and hurricanes

The trail of devastation left by Hurricanes Harvey and Irma has reminded us once again that coastlines and even entire regions of the country can be demolished by natural disasters. While catastrophes cannot be prevented, planning around them with a well-crafted disaster recovery (DR) strategy can help minimize the damages and keep your business alive.

Improvements on the new Outlook webmail

Improvements on the new Outlook webmail

Organizing email is an important but time-consuming task. An email system that lets employees spend less time sorting messages and adjusting settings and more time working is an easy way to improve your business. If your company uses Outlook.com, here are some new features that help.

Social engineering exploits Facebook

Social engineering exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide.

What is it?

Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case.

Take better notes with Microsoft’s OneNote

Take better notes with Microsoft’s OneNote

Microsoft Word, PowerPoint and Excel form the foundation of most Office experiences. But there’s another application that doesn’t get its fair share of attention: OneNote. It’s severely underutilized considering how helpful it is, so we’re going to explain some of the basics.

Beware of a new Locky-type ransomware

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.

What is Amazon AppStream 2.0?

What is Amazon AppStream 2.0?

Managing applications on-premise is expensive and inefficient. Today’s workforce is now more mobile than ever before, which is why businesses are investing in remote access solutions so their employees can access applications and documents whenever and wherever.

Move over IE, Hello Microsoft Edge!

Move over IE, Hello Microsoft Edge!

Not all Windows users are fans of Internet Explorer, and not all Mac users are crazy about Safari. But there’s good news for Windows users: Windows 10 replaces IE with a brand new browser, Microsoft Edge. Here is a list of the key features you shouldn’t miss out on:

Import favorites
You can easily import the list of websites you’ve marked as favorites from any web browser to Microsoft Edge.

Make use of your ancient computer

Make use of your ancient computer

Do you remember the days when your computer was struggling to catch up with all the tasks you had at hand? We don’t blame you if you’ve already dumped your desktop for a slicker model, but in case you have one or more collecting dust in your storage room, here are some ways to make use of your ancient computers.