Blog

Distributed spam hides illegal activities

February 8th, 2018
Distributed spam hides illegal activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails.

Virtual DR: The best anti-ransomware tool

February 2nd, 2018
Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against future ransomware.

4 new features for Bing Search

February 1st, 2018
4 new features for Bing Search

Although the internet is a seemingly endless source of information, you may find that unless you ask the right questions, you won’t get the right answers. As a way to accommodate a greater variety of user queries, Bing has recently been updated with four new features.

Virtualization from Microsoft gets faster

January 30th, 2018
Virtualization from Microsoft gets faster

Microsoft isn’t always the first company that pops into mind when talking about virtualization, but it does offer one of the best solutions in the industry. In an ongoing effort to compete with companies like VMWare and Amazon Web Services, Microsoft has released a massive upgrade for its virtualization platform — and it’s totally free!

Azure: Microsoft’s virtualization platform

As a full-service cloud solution, Azure is a secure and flexible data center that businesses of all sizes can benefit from.

Skype offers end-to-end encryption feature

January 29th, 2018
Skype offers end-to-end encryption feature

Transmitting voice conversations over an internet connection can be risky, with no way of knowing whether or not anyone is tapping your calls. In response to this concern, Skype has just released a new feature that can encrypt all conversations, ensuring more privacy when calling or texting.

Differentiating Groups, Yammer, and Teams

January 26th, 2018
Differentiating Groups, Yammer, and Teams

Yammer, Outlook Groups, and Microsoft Teams have plenty in common. They’re all Office 365 tools designed for sharing files and communicating with colleagues. So what differentiates each from the other and when should you use them? Here’s a quick rundown to help you decide.

Beware of the Meltdown and Spectre patches

January 24th, 2018
Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you.

Hardware flaws affect browser security

January 19th, 2018
Hardware flaws affect browser security

In the first week of 2018, security researchers announced that modern computer processors have a fundamental flaw called Spectre. If exploited, hackers could gain access to systems that store confidential information. And the most vulnerable to these attacks are outdated web browsers like Chrome, Safari, Microsoft Edge, and Firefox.

Gear up your network equipment with UPS

January 18th, 2018
Gear up your network equipment with UPS

During a power outage, responsible business owners use emergency power to keep desktop computers from unexpectedly shutting down. While that’s certainly a good strategy for keeping machines operational and preventing data loss, there’s something else you can do to ensure that your staff remains productive while weathering a storm: uninterruptible power supply (UPS) for networking equipment.

Spectre and Meltdown vs. virtual desktops

January 16th, 2018
Spectre and Meltdown vs. virtual desktops

On January 3, 2018, two hardware flaws were announced that affect nearly every computer sold within the last 20 years. Every virtualization service available relies on vulnerable computers, but you needn’t worry — almost every vendor has already protected your virtual machines.