Posted on Monday December 25, 2017 | windows 10 insider, timeline, tabs, sets, microsoft, features
The recent Windows 10 Fall Creators update is just a few weeks old but Microsoft has already released another major update. On December 19, they rolled out a new Windows 10 Insider update to test two new features: Sets and Timeline.
Posted on Friday December 22, 2017 | phishing scam, https, encryption, cyber security
Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.
Posted on Thursday December 21, 2017 | update, security, root, macos, mac, high sierra, apple
With new vulnerabilities discovered every day, it’s important for users to keep their computers up to date. The problem is many find this process tedious and sometimes ignore it altogether. But if you’re a Mac user, we urge you to install the latest patch as soon as possible.
Posted on Wednesday December 20, 2017 | software, security, laptop, keylogger, hp, hardware, cyber security, antivirus
Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear from it.
Posted on Tuesday December 19, 2017 | wrike, trello, streak, smartsheet, ringcentral, prosperworks, intuit quickbooks, hire, google add ons, gmail third party apps, gmail extensions, gmail add ons, docusign, dialpad, asana
Add-ons and swim rings share one thing in common -- they both can save your life! While it might not be literal in the case of the former, add-ons do heaps to streamline your everyday tasks and literally save you hours of work. If you use Gmail, you can experience it today!
Posted on Friday December 15, 2017 | user identity, identity management, iam, business security, access permission, access management
Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer.