When you receive an email from an unfamiliar source urging you to click on a link or download a file, it’s easy to send it straight to the bin due to its spam-like nature. It’s a completely different story when the message is sent via Facebook Messenger by one of your friends.
Facebook faces devious adware
Should you use Voice over IP?
4 questions to ask your cloud backup service provider
When it comes to choosing a cloud backup provider, many businesses often jump the gun and make hasty decisions based on limited information or pressure to start as soon as possible.
However, it's important that you understand the financial and operational impact that this choice will have on your business before rushing into a long-term commitment.
OneNote: the hidden gem in Microsoft Office
New Locky ransomware: what you need to know
In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.
How Amazon AppStream 2.0 can help businesses
Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service.
How to protect your VoIP system from phishing
Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call.
Office 365 gets a slew of new upgrades
How to protect your organization from social engineering
Have you ever received the notorious email from the Nigerian prince who promises you one million dollars in exchange for your social security number, date of birth, address, and credit card details? While this seems like a poorly disguised scam, you'd be surprised by how many people are actually fooled by this social engineering trick.
Black and white: Not all hackers are bad
When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.

