With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on.
Every year in the fall, Apple releases updates to its hardware devices and software solutions. This year included some especially exciting announcements, particularly with regard to the iPhone. Whether Apple products are integral to your business or just personal favorites, you need to be aware of what was released this month.
Hurricanes Harvey and Irma have already caused billions of dollars in damages, but hurricane season is far from over. Experts are predicting that there will be five more major tropical storms through October, and if they present risks to your business, it’s time to establish a watertight disaster recovery (DR) plan.
Along with a new, clean look, Outlook.com introduces improvements that will make you and your staff’s lives easier. A more convenient mail sorting system, easy-to-implement social media integration, and enhanced security features are some of the advantages users should be excited about.
Despite the apparent break from international ransomware attacks, hackers are still keeping themselves busy, this time using an adware campaign that could easily be one of their most cunning tricks yet. If you use Facebook Messenger, you need to read this.
You are probably familiar with desktop-based ransomware like Petya, WannaCry, CryptoWall, and CryptoLocker. But mobile ransomware is an emerging trend you don’t want to learn about only after it strikes. Take a minute to read our summary of mobile ransomware and some easy prevention tips.
Can you list all the apps in the Microsoft Office suite? Did you forget OneNote? It’s often overlooked, but Microsoft’s note-taking app is incredibly useful for everything from brainstorming sessions to learning courses. Let’s go over what it takes to get started with OneNote.
A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far.
When new malware surfaces, many people often assume that it’s designed to attack Windows computers. However, Mac malware has been growing in popularity. Earlier this year, security researchers unearthed a new strain of spyware that may have been silently monitoring Mac computers for years.
Success is not just about putting in the hours, but also being adaptive and investing in the right tools to improve outputs. Keeping work confined to the office might have been adequate years ago, but not anymore. Today’s workforce is now more mobile than ever, which is why businesses are turning to remote access solutions.