Blog

New phishing scam targets Office 365 users

New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that’s even more difficult to identify.

Apple released a new iPhone and so much more!

Apple released a new iPhone and so much more!

10 years after the first iPhone was announced, Apple’s keynote addresses are still global events. This year’s slate of fall releases included a lot more than incremental updates to the company’s flagship device. Regardless of whether your next Apple purchase is coming out of a personal or company budget, you’ll want to know what’s new.

Facebook faces devious adware

Facebook faces devious adware

When you receive an email from an unfamiliar source urging you to click on a link or download a file, it’s easy to send it straight to the bin due to its spam-like nature. It’s a completely different story when the message is sent via Facebook Messenger by one of your friends.

Should you use Voice over IP?

Should you use Voice over IP?

You’ve probably heard of VoIP phone systems by now. But do you know what they are and why they’re so popular among small- to medium-sized businesses? If you’re reluctant to ditch your traditional phone system, these VoIP benefits might convince you otherwise.

OneNote: the hidden gem in Microsoft Office

OneNote: the hidden gem in Microsoft Office

Almost everyone loves PowerPoint, Excel and Word, but there’s another Office application that should be recognized as a must-have: OneNote. It’s an app for pulling together text, video, audio, and other visual resources to create shareable notebooks full of useful information.

New Locky ransomware: what you need to know

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.

Spyware has been infecting Macs for years

Spyware has been infecting Macs for years

While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the malware gets into Mac computers.

How Amazon AppStream 2.0 can help businesses

How Amazon AppStream 2.0 can help businesses

Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service.

How to protect your VoIP system from phishing

How to protect your VoIP system from phishing

Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call.

Office 365 gets a slew of new upgrades

Office 365 gets a slew of new upgrades

There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses.