How to protect your VoIP system from phishing

Posted on Monday August 21, 2017  |  voip, vishing scam, phishing scam, internet telephony, cyber security

Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call. Your business will be well-served by guarding itself from this new breed of phishing scam.

 

Office 365 gets a slew of new upgrades

Posted on Friday August 18, 2017  |  update, smbs, office 365, listings, invoicing, connections, business premium, business center

There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses.

 

Useful business features in Windows 10

Posted on Thursday August 17, 2017  |  windows 10, operating system updates, microsoft, fall creators update

The Windows Fall Creators Update released in April introduced many useful and interesting features, including a decluttered Start menu, more control over Windows updates, and an enhanced Microsoft Edge browser. Five months later, Microsoft follows up on all those enhancements with a new set of features. Here’s everything business users should get excited about.

 

Black and white: Not all hackers are bad

Posted on Wednesday August 16, 2017  |  white hat, hacking, gray hat, cybersecurity, black hat

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.

 

Best Mac tips and shortcuts

Posted on Tuesday August 15, 2017  |  macos sierra, mac tips, mac shortcuts, mac features, apple

Mac operating systems are known for their intuitive user interface with minimal learning curve. But did you know that over the years, Macs have been equipped with a bunch of new shortcuts and hidden features? Here are our picks of the ones guaranteed to make life easier.

 

Google’s preferred sign-in method

Posted on Monday August 14, 2017  |  verification, smb, protection, process, password, google, 2 step

Last year, the National Institute of Standards and Technology removed SMS two-factor authentication from its list of preferred authentication methods. Since then, Google has encouraged users to use prompts-based 2-Step Verification (2-SV) methods instead. Find out why:

 

Page:   12345...78

Off-Site Cloud Backups

Contact Us