Blog

Office 365 users face new phishing scam

With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on.

Equifax blames breach on a server flaw it should’ve patched

Source: www.engadget.com

Equifax's latest update on its unprecedented security breach notifies the public that its investigation has found the cause of the theft. Along with an unnamed security firm (ZDNet and others have reported it's Mandiant) the company confirmed rumors that attackers exploited a flaw in the Apache Struts Web Framework.

6 ways to flood-proof your business IT

Hurricanes Harvey and Irma have already caused billions of dollars in damages, but hurricane season is far from over. Experts are predicting that there will be five more major tropical storms through October, and if they present risks to your business, it’s time to establish a watertight disaster recovery (DR) plan.

Useful features on the new Outlook.com

Along with a new, clean look, Outlook.com introduces improvements that will make you and your staff’s lives easier. A more convenient mail sorting system, easy-to-implement social media integration, and enhanced security features are some of the advantages users should be excited about.

Protect yourself from this Facebook threat!

Despite the apparent break from international ransomware attacks, hackers are still keeping themselves busy, this time using an adware campaign that could easily be one of their most cunning tricks yet. If you use Facebook Messenger, you need to read this.

Useful tips on reducing your IT budget

You can easily lower your IT budget by better managing your print infrastructure. It sounds too good to be true, but it’s totally doable. Companies big and small follow inefficient printing models without even realizing it, but you can break the mold by following these tips:
Replace outdated printers
Outdated and cheap printers may be functional, but they are putting a huge dent in your IT budget.

How to use OneNote like a pro

Can you list all the apps in the Microsoft Office suite? Did you forget OneNote? It’s often overlooked, but Microsoft’s note-taking app is incredibly useful for everything from brainstorming sessions to learning courses. Let’s go over what it takes to get started with OneNote.

Locky-type ransomware is attacking systems

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far.

The values of Amazon AppStream 2.0

Success is not just about putting in the hours, but also being adaptive and investing in the right tools to improve outputs. Keeping work confined to the office might have been adequate years ago, but not anymore. Today’s workforce is now more mobile than ever, which is why businesses are turning to remote access solutions.

Lessons to learn after hackers hijack HBO’s Facebook and Twitter accounts

Source: www.tripwire.com

It’s never a dull day if you’re working in HBO’s IT security team.

One day you’re dealing with the unauthorised leaking of upcoming episodes of “Game of Thrones”, next you’re facing multi-million dollar extortion demands from hackers who’ve broken into your network and stolen 1.5 terabytes data and the personal contact details of your celebrity cast, then you’re finding that yet more unaired episodes of your hit TV shows have made it out in the wild due to staff error.

For many businesses, complying with the GDPR’s specific data security and privacy requirements may sound daunting, but it doesn’t have to be. Our eBook Navigating the Data Privacy Labyrinth: A Guide to GDPR Compliance can simplify your compliance journey.Grab your FREE eBook here!
+