customisable counter

Blog

Is WebRTC a worthwhile addition for you?

Is WebRTC a worthwhile addition for you?

The VoIP industry is becoming increasingly hard to define. More and more are voice communications being made over internet connections, and sometimes you may not even realize you’re doing it. WebRTC is a newcomer to the internet-based telephony field. Read on to decide whether it’s for you. What is WebRTC? At its most basic, WebRTC […]

The list of Cortana commands you need

The list of Cortana commands you need

If you aren’t using Microsoft’s voice-activated personal assistant, Cortana, you’re missing out on some beneficial, hands-free functionality. Because Cortana is now fully integrated into Windows 10, she can help you launch applications, make dinner reservations, and more. Try the following commands to make the most out of your virtual assistant. Hey, Cortana Before asking her […]

Is fileless malware a threat to you?

Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast of all the details is […]

New Mac malware linked to DNC hacking group

New Mac malware linked to DNC hacking group

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks. If you own a […]

Advice from a failed disaster recovery audit

Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways. […]

Vulnerabilities on WordPress websites

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]

7 Ways To Dodge A Data Disaster

7 Ways To Dodge A Data Disaster

You stride into the office early one Monday morning. You grab a cup of coffee, flip on your computer and start checking e-mail… A note pops up that rivets your attention: “Your files have been encrypted. Send $5,000 within five days or they will all be destroyed.” You start sweating as your throat constricts and […]

The right social media platforms for SMBs

The right social media platforms for SMBs

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn’t mean it will suit your organization. Instead, business owners should familiarize themselves with all the available […]

Are your printers safe?

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One study reveals that at least 20 printer models are vulnerable to Distributed […]