Blog

Virtual DR for ransomware protection

The massive success of ransomware like WannaCry and Petya have spurred other cybercriminals to develop their own ransomware and sell it on the black market. This means we can expect more ransomware attacks in the future. To prepare your business, you need virtualized disaster recovery solutions.

Microsoft unveils 4 search features for Bing

Thanks to a recent update from Microsoft's Bing search engine, finding answers to your questions is no longer an issue of phrasing or syntax. Read on for more information about the four latest upgrades.
Validating answers using many websites
Before the recent update, Bing would answer questions based on what it found on a single website.

Groups, Yammer, and Teams defined

While most Office 365 apps serve a unique purpose, tools like Outlook Groups, Yammer, and Microsoft Teams can all be used to communicate and collaborate with coworkers. However, there are subtle differences in the way they can be used, and today we’ll break it down for you.

Web-based cryptominers are malware

Original source: Sophos

Legitimate cryptomining programs ask users for permission to run. Malicious versions don’t, opting instead to quietly leach a computer’s resources. SophosLabs is seeing more of the latter variety, with a new twist:

Instead of showing up as executable files, they take the form of scripts hidden on websites, mining for cryptocurrency in the browser.

HillSouth Celebrates 10 Years Serving SC Health Centers

January 20, 2018 – Columbia, South Carolina: HillSouth was recently honored with a 10 year partnership award from Community Integrated Management Services (CIMS) at its 10 year anniversary celebration event this month. CIMS was founded by a large number of the Federally Qualified Community Health Centers (FQHCs) in the state of South Carolina and is charged with managing their relationships and contracts with the managed care organizations that work with South Carolina’s FQHCs. CIMS also supports the centers with key insights and resources that assist them with delivering exceptional patient outcomes.

Enlist IT help when installing CPU updates

When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released.

3 simple and easy cyber-security tips!

Data security and privacy should be a top priority in this age of constant and downright dangerous cyber attacks. However, in your quest for ultimate security, don’t forget to implement these non-technical steps to shield your business’s IT resources.

Critical browser vulnerabilities discovered

According to security researchers, a bulk of the world’s computer processors have gaping flaws. The flaws, grouped under the term ‘Spectre,’ affect many critical systems including web browsers like Chrome, Safari, Microsoft Edge, and Firefox. Here’s a quick rundown of these major vulnerabilities and what you can do to secure them.

Should you use UPS for your network gear?

Smart business owners use uninterruptible power supply (UPS) for emergency situations like a storm, fire, or other disasters. Often, a UPS is deployed for desktop computers to give employees ample time to save their work and prevent losing unsaved work.

New AI-driven Features For Office 365 Users

Enriching Office 365 with more everyday AI functionalities, Microsoft has introduced ‘Insights Preview’ to MS Excel, ‘Acronyms’ feature for MS Word, and a Text-in-image search feature to help its users to do their best work. Learn more about the recent upgrades to Office 365 products and the new Microsoft Whiteboard Preview app in this article.

Is your nonprofit struggling with IT challenges? Discover how an MSP can empower your organization.Download our FREE eBook today!
+