Blog

Phishing alert: scammers now use encryption

When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes. How hackers use encryption to carry out phishing scams According […]

Apple fixes major macOS security flaw

Apple cyber incidents have increased steadily over the past few months. In 2017, we’ve witnessed several Mac ransomware strains and a host of other computer viruses. Recently, Apple discovered a major security flaw with macOS High Sierra. Read on to find out more. Serious bug On November 28th, security researchers reported a serious bug in […]

Gmail equipped with new add-ons!

Google announced at its I/O developer conference back in March that it will be launching some new extensions for Gmail. The tech company has kept its word and here’s everything you need to know about the latest productivity-enhancing add-ons. Google’s focus is on productivity services that are already connected to email systems one way or […]

IAM benefits for your business

Your employees access applications and confidential business data every day. Hackers, on the other hand, are trying to do the exact same thing but for more malicious reasons. To make matters worse, even employees can go rogue and steal your data, which is why it’s crucial that you have an IAM solution in place. What […]

Fight mobile malware with MTD

Protecting your business data goes beyond making sure your office computers and networks are safe. Because of this, businesses are recognizing the importance of a mobile threat detection (MTD) strategy, which puts up barriers in your company’s mobile devices in order to block mobile malware and other threats. Here’s what you need to know about […]

The many faces of virtualization technology

Not too long ago, the cloud was the money-saving IT trend for consumers and business owners. Now, that title goes to virtualization technology. It’s new, it’s complicated, but it’s not something you can ignore. Here are a few ways you can use virtualization to improve efficiency and productivity in your office. What is the core […]

Microsoft Office made easy!

Microsoft is known for their easy-to-use products. But did you know that behind Office’s simple-looking user interface lie many in-depth features? From Word and Excel to PowerPoint and Outlook, here are some free training videos that will help you master them all. Office Basics is a series of free Office training videos from Microsoft which […]

Say goodbye to pre-installed crapware

A newly bought PC with a heap of unwanted pre-installed trialware is a nightmare for us all. Once it’s on your computer, it will either keep urging you to upgrade to a more expensive version or bombarding you with loads of ads, some of which could compromise security. But thanks to Microsoft Signature Edition PCs, […]

VPNs: Why you need them

Installing powerful antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, government agencies, and ISPs constantly monitoring networks and your online habits, hopping onto a Virtual Private Network (VPN) is crucial for keeping your surfing habits private. Here’s why. What is VPN? Simply put, a VPN is […]