It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]
Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]
My days are hectic. My life is run by my calendar and therefore my iPhone. I am constantly checking emails, making calls and researching topics and products from my phone all day. If you know me then you know how much I love my iPhone 7. The problem has always been the battery life! I Read more about Apple iPhone 7 Smart Battery Case Is The Best![…]
We are at the VMworld conference this year learning about all of the new technologies that are being introduced by the biggest names in the industry. We will post what we learned on Friday.
With the current direction the industry is heading, more and more IT environments are moving to cloud solutions. This means you need to use additional tools to keep your cloud and on-premise environments in sync to create a true Single Sign-On solution. In this article, we will be reviewing sync features of one specific tool Read more about Azure AD Connect – Connecting your infrastructure to the cloud[…]
Office365 is a fantastic mail platform with many options. However, due to the large amount of options, certain features are often unexplored. Specifically, there seems to be a lot of confusion regarding O365 mailboxes. I frequently see offices paying for mailbox licenses when a different free mailbox could’ve been used. In this article I will review Read more about Using O365 Mailboxes and Permissions[…]
CryptoWall Viruses CryptoWall viruses such as CryptoLocker, AlphaCrypt and TeslaCrypt to name a few are ransomware trojans that encrypt any file that it has access to your on machine, delete the original, and then demand money to restore your data. What this means is that not only will it delete your files from your computer Read more about Crypto![…]
It’s Monday morning at the office, and you just came back from a lovely trip to Hawaii. It was a long overdue break from the technology, phone calls, and commutes of everyday life. As you settle into your office chair and open your inbox, your eyes widen as you realize it’s time to pay the Read more about De-Cluttering with Office 365[…]
Today we will discuss the importance of having your emails in the cloud and what options you have you to choose from.