Blog

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against future ransomware.

4 new features for Bing Search

Although the internet is a seemingly endless source of information, you may find that unless you ask the right questions, you won’t get the right answers. As a way to accommodate a greater variety of user queries, Bing has recently been updated with four new features.

Android users, meet Amazon’s Alexa

Because Amazon Echo sold like hotcakes during the holidays, Alexa became the darling of Christmas 2017, taking over our homes and hearts. With the Android version of the app now enabled with voice control, Alexa can continue to smoothly make its way into our lives via our smartphones.

Differentiating Groups, Yammer, and Teams

Yammer, Outlook Groups, and Microsoft Teams have plenty in common. They’re all Office 365 tools designed for sharing files and communicating with colleagues. So what differentiates each from the other and when should you use them? Here's a quick rundown to help you decide.

Issues found for new Windows patches

Despite security being one of Microsoft’s top priorities, it has been recently discovered that there are two vulnerabilities in computer chips, named Meltdown and Spectre, that put private data in jeopardy. As a solution, Microsoft has released an update to fix this vulnerability.

Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you.

Fortify your data, physically

Truly optimized security settings and software are beyond the capacity of most business owners. You just don't have time to tinker with your office IT. Instead, try these quick and easy tips before calling us.
Cover up your webcam
There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised.

Hardware flaws affect browser security

In the first week of 2018, security researchers announced that modern computer processors have a fundamental flaw called Spectre. If exploited, hackers could gain access to systems that store confidential information. And the most vulnerable to these attacks are outdated web browsers like Chrome, Safari, Microsoft Edge, and Firefox.

Gear up your network equipment with UPS

During a power outage, responsible business owners use emergency power to keep desktop computers from unexpectedly shutting down. While that’s certainly a good strategy for keeping machines operational and preventing data loss, there’s something else you can do to ensure that your staff remains productive while weathering a storm: uninterruptible power supply (UPS) for networking equipment.

Android File Transfer via USB Cable

There are many different ways to transfer files between Android phones and computers; however, most of these methods require an internet connection on both the phone and the computer during the process. So, if you are about to be off the grid for quite some time or would just rather transfer files without the internet, here’s how you can do just that with your trusty USB cable:

What you need:

Your Android phone
A computer with a USB port
A USB cable

What you need to do:
If you have a Windows computer…

Start by plugging your phone into the computer via USB port.