News

BYOD Security Tips

The bring your own device (BYOD) phenomenon continues to rise in the workplace. There are a number of benefits and risks that BYOD brings. For it to be successful, you must balance employee freedom and data security. Here’s how you can do that. Whether your employees are using smartphones, tablets, or laptops, you need a BYOD security policy. Additionally, you need to be aware of the key BYOD security risks: Loss or theft of device – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices being lost or stolen, and a greater risk of the company data that’s stored or accessed on these being compromised. Data loss – In the event that a device is lost, stolen, or damaged, any locally stored data may be lost permanently if it’s not backed up … READ MORE »

Defend Against this New Office 365 Threat

Some hackers have become so skilled that they don’t even need you to give up your credentials to hack into your account. One recent cyberthreat is targeted towards users of Microsoft Office 365. You don’t want to be the next victim, so read up. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page. How does it work? The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page … READ MORE »

Windows 10 Tips and Tricks

If you think you haven’t maximized all that Windows 10 has to offer, you’re probably right. Windows 10’s recent updates include a few small but useful enhancements that’ll make your life easier. Aside from the Start Menu’s return or the Cortana display enhancements, there’s more to Microsoft’s snazzy operating system that you probably haven’t used. Performance/Power slider There are two kinds of computer users: those who value battery longevity and those who prefer optimized system performance. The Performance/Power slider in Windows 10 lets you easily toggle between the ‘Best battery life’ (when you’re trying to save battery) and the ‘Best performance’ (when you need your system to perform optimally), or set a balanced battery and system performance setting. Just click the battery icon in the taskbar and adjust the slider based on your preference. Night Light Those who use computers … READ MORE »

Why Analytics Are Important to Data Backups

Data is vital to your business. It’s how you keep records, track activities, and function as a business in general. However, with all of the data that your business generates on a regular basis, it can be difficult to keep everything backed up at all times. Fortunately, there is a way to better prioritize your data backups. Too much data may sound like a good thing, but depending on your organization, backing up everything à la minute may be out of your price range or just flat out impossible with the amount of information that you create. The problem then becomes: How do I structure my backup plan to prioritize the critical files? We believe the answer is analytics. In order to avoid backing up unneeded data, you’ll require a “smarter” backup solution. This is where an experienced MSP (managed … READ MORE »

Keep Your Mobile Devices Safe with These Tips

More businesses are now allowing their employees to use mobile devices to increase productivity and profitability. But smartphones and tablets are just as vulnerable to hacking as desktops and laptops. Worse, employees may be exposing their mobile devices unwittingly to cybercriminals. Here are some helpful tips to keep your devices safe. Ensure mobile OS is up-to-date The updates on Apple and Android operating systems (OSs) improve overall user experience, but their most important function is to fix security vulnerabilities. Reduce your business’s exposure to threats by installing updates for all devices as soon as they become available. Don’t wait for a few weeks or months to update, as this give hackers ample time to exploit vulnerabilities on devices that run on an outdated OS. Install business applications only Downloading apps seems harmless. But lenient policies on what should and shouldn’t … READ MORE »

Outdated Firmware: An Overlooked Threat

If most of your company’s computers are obsolete, they double or even triple your chances of experiencing a data breach. This emphasizes how dangerous it is to have outdated applications, operating systems, and even web browsers. Failing to update your firmware could expose your business to major security threats. What is firmware? Firmware is a basic type of software that is embedded into every piece of hardware. It cannot be uninstalled or removed, and is only compatible with the make and model of the hardware it is installed on. Think of it like a translator between your stuff and unchanging hardware and your fluid and evolving software. For example, Windows can be installed on almost any computer, and it helps users surf the internet and watch YouTube videos. But how does Windows know how to communicate and connect with your … READ MORE »

Don’t Let Hackers Fool You with These Tricks

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing This is the most frequently used social engineering attack, especially against small businesses. Check out these frightening statistics: Kaspersky Labs revealed that its anti-phishing system prevented more than 107 million attempts to connect users to malicious websites in just one quarter of 2018. Barkly added that 85% of companies have fallen prey to this nefarious scheme. And PhishMe reports that the number of these scams is growing by at least 65% per year. How is phishing carried out? Criminals make use of emails, phone calls, or text messages to steal … READ MORE »

Prolong Laptop Battery Life with These Tricks

It’s difficult to get any work done with your laptop notifying you that it’s running out of juice. And if you are not close to a power outlet, your laptop will soon be nothing more than a cold slab of metal and plastic. Here are some helpful tips to prolong your laptop battery’s life. Some truths about your laptop battery Batteries in many modern devices are lithium-based — either lithium-ion or lithium-polymer — and users must take note of the following guidelines for proper battery maintenance: Leaving your battery completely drained will damage it. Batteries have limited lifespans. So no matter what you do, yours will age from the very first time you charge it. This is because as time passes, the ions will no longer be able to flow efficiently from the anode to the cathode, thereby reducing the … READ MORE »

9 Cybersecurity Terms You Need to Know

Cybersecurity is everyone’s responsibility. But you don’t need to be an IT expert to know how to protect yourself from a cyberattack. To help you get started, here are helpful terms you need to know so you’re not left in the dark, whether you’re teaching yourself how to update your anti-malware, updating your systems, or consulting your tech support. Malware For a long time, the phrase “computer virus” was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as malware. Ransomware Don’t let all the other words ending in “ware” confuse you; … READ MORE »

Social Engineering Exploits Facebook

You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide. What is it? Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case. Basically, the adware uses Facebook Messenger to track your browser activity and pushes you to click on malicious ads or give out personal information. How does it work? By clickjacking and hijacking credentials of Facebook users, the adware is able to send messages to people in the victim’s contact list. If you’re one of … READ MORE »