Blog

Business IT News, Tips and Information Show all

Hackers Can Spy and Take Screenshots with New Mac Virus

Hackers Can Spy and Take Screenshots with New Mac Virus

HomeA recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab confidential data from computers, is codenamed “Mokes”. Discovered in January of this year by Stefan Orloff of Kaspersky Labs, Mokes was…

Read more 

Yahoo Data Theft Good Reason to Regularly Change Passwords

Yahoo Data Theft Good Reason to Regularly Change Passwords

HomeIn case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts…

Read more 

Two-Factor Authentication with AuthAnvil Provides Better Security

Two-Factor Authentication with AuthAnvil Provides Better Security

HomeHave you heard of two-factor authentication with AuthAnvil? This is an IT management solution many companies have turned to for better data access control and (mobile) device management. Two-Factor Authentication or 2FA is a smart way to ensure your access…

Read more 

Is Your IT in the Cloud?

Is Your IT in the Cloud?

HomeUnderstanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as businesses of all sizes face the ongoing threat of cybersecurity attacks. Many businesses are now…

Read more 

10 Ways to Make the Most of Your Office 365 Migration

10 Ways to Make the Most of Your Office 365 Migration

HomeThere are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of benefitting from moving to the cloud-based service of Office 365, but were you…

Read more 

The Healthcare Industry is Falling Behind on Data Protection

The Healthcare Industry is Falling Behind on Data Protection

HomeThe results of a recent Vanson Bourne Global Data Protection Index study may shock some in the healthcare industry: Only 10 percent of organizations doing business on the Web are “ahead of the curve” on data maturity and security readiness, according to the…

Read more 

Using Two-Factor Authentication to Address Workplace Cyber Threats

Using Two-Factor Authentication to Address Workplace Cyber Threats

HomeTwo-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most directly effective way to combat password hacking and the unauthorized access to company data, software, and devices. Password hacking is becoming more…

Read more 

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

HomeiPhone and iPad vulnerabilities, or zero-days exploits allow hackers to access any and all data, know your location by GPS co-locating, and also be able to use your camera to spy on you. Although Apple released the patch in the…

Read more 

Switching To Windows 10?

Switching To Windows 10?

HomeHave You Made the Switch to Windows 10 Yet? The much-ballyhooed rollout of Windows 10 a little over a year ago was a welcome “fix” to many for the Windows 8 fiasco in 2012. The Windows 10 campaign represents Microsoft’s…

Read more 

Lessons Learned From The Athens Orthopedic Data Breach

Lessons Learned From The Athens Orthopedic Data Breach

HomeData breaches seem to have become a daily headline that causes readers to catch their breath each and every time. This knee-jerk reaction is for good reason. According to the Office of Civil Rights (OCR), in 2015 there were approximately 253…

Read more