OneNote: the hidden gem in Microsoft Office

September 1st, 2017

Almost everyone loves PowerPoint, Excel and Word, but there’s another Office application that should be recognized as a must-have: OneNote. It’s an app for pulling together text, video, audio, and other visual resources to create shareable notebooks full of useful information.

New Locky ransomware: what you need to know

August 30th, 2017

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.

Spyware has been infecting Macs for years

August 29th, 2017

While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the malware gets into Mac computers.

How Amazon AppStream 2.0 can help businesses

August 28th, 2017

Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service.

Surf the net with Microsoft Edge

August 25th, 2017

People prefer one web browser over another for all kinds of reasons, including ease of use, applications, security and of course, performance. If you’ve recently downloaded Windows 10, there’s a new browser on the block: Microsoft Edge. Here are some nifty features you may find useful.

What to do with your dinosaur PC?

August 24th, 2017

When smartphones first outsold PCs in 2010, people no longer have to put up with slow and bulky computers to do business. This comes as no surprise why many stashed their aged PCs away. But there are ways to breathe new life into your ancient laptop and computer, so if you haven’t trashed them, it’s time to plug them in.

Microsoft’s newest virtualization service

August 23rd, 2017

Azure is a cloud platform for creating, deploying and managing virtualized solutions that are hosted by Microsoft servers. Included in Azure’s list of services is a technology that is quickly gaining popularity: containers. They’re a great way to get more out of your servers, but until recently they were also incredibly hard to manage.

How to protect your VoIP system from phishing

August 21st, 2017

Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call.

Office 365 gets a slew of new upgrades

August 18th, 2017

There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses.

Black and white: Not all hackers are bad

August 16th, 2017

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.