Hackers Can Spy and Take Screenshots with New Mac Virus

A recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab

Keep Reading

Yahoo Data Theft –A Good Reason to Regularly Change Passwords

In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the rea

Keep Reading

How to Stop Facebook from Listening to You Through Your Phone

Although empirical evidence that Facebook is listening to its users through the microphone settings available on smartphone apps for the social media

Keep Reading

Is Your IT in the Cloud?

Understanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as

Keep Reading

10 Ways to Make the Most of Your Office 365 Migration

There are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of

Keep Reading

5 Ways to Make the Most of Employee Social Media Time

A June 2016 survey conducted by Pew Research Center showed that 77% of the 2,003 surveyed American workers reported that despite workplace policies li

Keep Reading

Using Two-Factor Authentication to Address Workplace Cyber Threats

Two-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most d

Keep Reading

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

iPhone and iPad vulnerabilities, or zero-days exploits allow hackers to access any and all data, know your location by GPS co-locating, and also be ab

Keep Reading

Switching To Windows 10?

Have You Made the Switch to Windows 10 Yet? The much-ballyhooed rollout of Windows 10 a little over a year ago was a welcome “fix” to many

Keep Reading

Partners