Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017, a new Locky ransomware is poised to duplicate the success of […]
Beware of a new Locky-type ransomware
What is Amazon AppStream 2.0?
Managing applications on-premise is expensive and inefficient. Today’s workforce is now more mobile than ever before, which is why businesses are investing in remote access solutions so their employees can access applications and documents whenever and wherever. Amazon AppStream 2.0 is one such solution, and here’s why it’s worth looking into. What is it? Initially […]
Move over IE, Hello Microsoft Edge!
Not all Windows users are fans of Internet Explorer, and not all Mac users are crazy about Safari. But there’s good news for Windows users: Windows 10 replaces IE with a brand new browser, Microsoft Edge. Here is a list of the key features you shouldn’t miss out on: Import favorites You can easily import […]
VoIP phishing: how scammers do it
Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]
Grow your business with new Office 365 apps
Microsoft never fails to announce exciting new features for their products. In an effort to improve support for small- and medium-sized businesses, they introduced a series of new apps and enhancements for Office 365 during the Inspire conference in July. Some of the most notable upgrades include: Microsoft Connections Email marketing campaigns are a great […]
Are all hackers out to do harm? Not so fast
Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]
6 CRM best practices you need to know
Most companies have customer relationship management (CRM) software to help them keep track of contact information and purchase history. But having a large database is worthless if you’re not using it to build long-lasting relationships. To keep existing clients coming back and bring new ones in, follow these CRM best practices. Always update customer information […]
Google’s cloud platform receives an upgrade
As more and more businesses move their IT resources into the cloud, it’s no wonder that a company as big as Google is doing everything it can to upgrade the products it delivers over the internet. The search giant has at least 60 separate cloud services, and its most recent release makes them all faster. […]
Social media helps improve content
To truly understand their customers’ purchasing habits, all content marketers have to do is follow the clues left on social media platforms. By doing this, they can send the right content to the right audience and increase conversions and sales. Here’s what you need to know to utilize social media to your business’s advantage. Identify […]
Citrix features coming to Google Cloud
In an effort to build stronger relationships with major developers, Citrix worked with Google to get their virtual desktops running on Google’s cloud platform last month. This means certain Citrix products can be accessed by G Suite and Google Cloud users. Read on to find out what new features will soon be available. Workspace Service […]
- 1
- 2