IT Blog

6 tips to secure Mac computers

As a business owner, you want nothing more than to see your business succeed. But when faced with stiff competition and sophisticated cybercriminals, it’s hard to shake off the feeling of uncertainty. The future might be unpredictable, but the security of your Mac devices doesn’t have to be. So lock things down with these helpful […]

Hurricane-proof your business

While it’s easy to turn a blind eye against hurricane warnings and think “I already have a business continuity plan in place”, it pays to be extremely cautious, especially when the National Oceanic and Atmospheric Administration (NOAA) predicts up to four unusually active hurricanes this year. Needless to say, you simply can’t afford not to […]

Are your website’s images hurting your SEO?

Small- and medium-sized businesses are often tempted to relegate their search engine optimization (SEO) analysis to the free reports offered by online platforms like WordPress and Google Analytics. Unfortunately, those reports rarely provide the detail you need to start making improvements, and one of the things they tend to glaze over is image optimization. Do […]

Return of the smartphone attack

Due to the recent WannaCry ransomware exploits, business owners are refocusing their efforts on protecting computer networks. Despite that, many leave one key device unaccounted for: their smartphone. The truth is hackers can exploit the technology in your smartphone to conduct malicious acts, and one of the most common is Bluetooth technology. Google paid a […]

NSA endorses mobile virtualization

Mobile device management is a full-fledged subset of IT security. Employees store and view sensitive data on their smartphones, which exposes your organization to a significant amount of risk. Although there are plenty of great solutions for managing this, the National Security Agency (NSA) believes mobile virtualization is the next big thing. US government approved […]

7 tips for avoiding data loss in Office 365

Microsoft understands the value of your business’s data and the costly repercussions of losing it. That’s why they’ve released a slew of security and compliance tools for Office 365 subscribers. But given the increasing sophistication and frequency of data breaches, Office 365 cloud security solutions won’t be enough to protect your files. You’ll need to […]

What’s on tap for Windows 10 this fall?

This autumn, the changing leaves are accompanied by the Windows 10 Fall Creators Update from Microsoft. Not only is it retaining the “Creators Update” name, this version will reportedly focus more on bringing the Windows experience to iOS and Android devices as well. Here are some of the fresh features you’ll find in the upcoming […]

Lessons learned from the WannaCry malware

WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability of their data. If you’re still worried about whether you’re at risk, we’ve collected everything you need to know right here. Ransomware review Ransomware is a specific type of malware […]

Malware infects Mac HandBrake downloads

From May 2-6, a Trojan was attached to downloads of the macOS version of HandBreak, a free, cross-platform video transcoding software that processes multimedia files and other digital sources such as DVD and BluRay into .MP4 and .MKV files, and other formats. If you’re not sure whether your device has been infected, read on. How […]

Precautions against WannaCry ransomware

The WannaCry ransomware, a type of malware that encrypts a victim’s files and extorts them for money, has already affected thousands of machines worldwide. Unfortunately, the success of this attack is just the beginning. According to security researchers, other hackers will probably develop stronger WannaCry variants in the coming months. And if you don’t want […]