A recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab
Keep ReadingIn case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the rea
Keep ReadingAlthough empirical evidence that Facebook is listening to its users through the microphone settings available on smartphone apps for the social media
Keep ReadingUnderstanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as
Keep ReadingThere are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of
Keep ReadingA June 2016 survey conducted by Pew Research Center showed that 77% of the 2,003 surveyed American workers reported that despite workplace policies li
Keep ReadingTwo-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most d
Keep ReadingiPhone and iPad vulnerabilities, or zero-days exploits allow hackers to access any and all data, know your location by GPS co-locating, and also be ab
Keep ReadingHave You Made the Switch to Windows 10 Yet? The much-ballyhooed rollout of Windows 10 a little over a year ago was a welcome “fix” to many
Keep Reading