Office 365: What plan is the right one?

From Word to SharePoint, Office 365 has a lot offer. But each business requires different features from Office 365. Some may prioritize business analytics, while others may be content with no more ...

Four helpful Cortana commands

If you aren’t using Microsoft’s voice-activated personal assistant, Cortana, you’re missing out on some beneficial, hands-free functionality. Because Cortana is now fully integrated into Windows 10, she can help you launch applications, ...

Fileless malware: who are the targets?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here ...

Russian hackers target Mac OS X users

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit ...

Real-world audits: disaster recovery plans

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is ...

Attacks on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently ...

Social media platforms that suit your SMB

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest ...

Popular printer brands are prone to attacks

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed ...

How to test out Android Instant Apps

At its I/O 2016 conference, Google introduced us to Android Instant Apps. This built-in feature allows users to access a cloud version of an app without having to download it from the ...

Virtualization troubles: 3 common pitfalls

Although data storage is only one of the many ways to benefit from virtualized hardware, it’s still the most common use of the technology. Despite this popularity, virtualized storage is susceptible to ...