Blog

Are your website’s images hurting your SEO?

Are your website’s images hurting your SEO?

Small- and medium-sized businesses are often tempted to relegate their search engine optimization (SEO) analysis to the free reports offered by online platforms like WordPress and Google Analytics. Unfortunately, those reports rarely provide the detail you need to start making improvements, and one of the things they tend to glaze over is image optimization. Do […]

Six new features from Android O

Six new features from Android O

Since it has just been released as a beta test, the next version of Google’s Android operating system still doesn’t have a full name and is known as “Android O” for now. What has been confirmed so far are extended battery life and an optimized notification system. But that’s not all. Here we’ve rounded up […]

7 tips for avoiding data loss in Office 365

7 tips for avoiding data loss in Office 365

Microsoft understands the value of your business’s data and the costly repercussions of losing it. That’s why they’ve released a slew of security and compliance tools for Office 365 subscribers. But given the increasing sophistication and frequency of data breaches, Office 365 cloud security solutions won’t be enough to protect your files. You’ll need to […]

Lessons learned from the WannaCry malware

Lessons learned from the WannaCry malware

WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability of their data. If you’re still worried about whether you’re at risk, we’ve collected everything you need to know right here. Ransomware review Ransomware is a specific type of malware […]

Malware infects Mac HandBrake downloads

Malware infects Mac HandBrake downloads

From May 2-6, a Trojan was attached to downloads of the macOS version of HandBreak, a free, cross-platform video transcoding software that processes multimedia files and other digital sources such as DVD and BluRay into .MP4 and .MKV files, and other formats. If you’re not sure whether your device has been infected, read on. How […]

Precautions against WannaCry ransomware

Precautions against WannaCry ransomware

The WannaCry ransomware, a type of malware that encrypts a victim’s files and extorts them for money, has already affected thousands of machines worldwide. Unfortunately, the success of this attack is just the beginning. According to security researchers, other hackers will probably develop stronger WannaCry variants in the coming months. And if you don’t want […]

Choosing a web browser: Which one is safest?

Choosing a web browser: Which one is safest?

Managing business-level cybersecurity is no simple task. Tens of thousands of users are finding that out the hard way as they confront the issue head on in the wake of an international ransomware epidemic. Although many cybersecurity strategies require professional IT support, a great place to start is assessing the security of your web browser. […]

Google adds phishing defenses for Android

Google adds phishing defenses for Android

Although hackers are known for unleashing a host of malware to infiltrate critical networks and devices, phishing emails are their most effective attack method. This scam preys on the trust of computer users with seemingly innocuous emails that request for login credentials or prompt a file download. Unlike other attacks, phishing requires only a convincing […]

Office 365 receives security upgrades

Office 365 receives security upgrades

With the increasing sophistication of cyberattacks, businesses need even stronger security tools to defend their sensitive documents. Fortunately, Office 365 subscribers now have more advanced security tools to stay ahead of the ever-evolving threat landscape. If you are concerned about security and compliance, these new Office 365 features could help. Threat Intelligence Threat Intelligence for […]

This fake Google app is really a phishing scam

This fake Google app is really a phishing scam

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done. Even well-trained users are falling for the most recent ploy, […]