Four Kinds of Phishing Attacks (and what to do about it)

Guided Help With Windows

Four Kinds of Phishing Attacks (and what to do about it) A phishing attack is one of the most common types of cyber security threats. Phishing is the use of bait information to trick the recipient into opening, clicking on, or responding to a fraudulent email, phone call or message that is often crafted to […]

Six Practical Benefits of Using Microsoft Teams Company-Wide

Microsoft Teams is now the gold standard for business collaboration. While there are some popular alternatives for certain collaboration functions, like Zoom or Slack, only Teams brings together the best of chat, video conferencing, and file collaboration in one simple and easy to use platform. What’s more, Microsoft Teams benefits are included in a Microsoft […]

Five Most Common Security Recommendations from Microsoft Secure Score

Five Most Common Security Recommendations from Microsoft Secure Score Microsoft Secure Score is a feature in Microsoft 365, which provides an overall measurement of an organization’s security posture. The higher the Secure Score, the better. The Secure Score is accessed from the administrator dashboard in Microsoft 365. Secure Score can be used in a number […]

What the Tech: The Aftermath of a Ransomware Attack

Petya Ransomware

In March of 2018, the city of Atlanta was held hostage by hackers. The ransomware attack by SamSam hacking crew infected the city with a virus that crippled computers, wireless networks, and blocked access to important data. It left police officers writing reports by hand, residents were unable to pay their utility bills online, access […]

Rio Olympics and the Internet

The Rio Olympics have captured the world’s attention and with this attention certain unappealing realities about Brazil’s culture and state of development have come to light. Everyone knows about the abhorrent living conditions in the city, the un-swimmable water (let alone drinkable), and the rampant Zika virus; but the latest development might just be the […]

Feds Attempt Curb of Ransomware

Ransomware has received unprecedented popularity, and healthcare organizations are ripe targets . Criminals know it. In just a few short years, Ransomware has dominated the market, prompting a response from the federal government last week. Ransomware attacks have risen from 1,000 attacks a day in 2015, the same time this year attacks rose to a […]

QuickTime; Quickly Becoming Dangerous For Windows

Microsoft Windows

The U.S. Department of Homeland Security last Thursday issued a warning to remove Apple’s QuickTime for windows. The alert is coming after a trend Micro’s report of two security flaws in the software; the software has no hopes of being patched as Apple has stopped support for the application. Computers running QuickTime are open to […]

Comcast Takes Road Less Traveled

Comcast Cables

Comcast is finally looking to get competitive, with a bold proposition for internet speeds 50-100% faster than the current average. The nation’s largest internet provider is looking to provide what it calls “gigabit service.” Comcast hopes to roll out the service in its 40-state territory, reaching 55 million customers in the next 2 years. Notoriously […]

Terrorists Get Their Wings Clipped

Twitter

Twitter has announced that since mid-2015 they have clipped the wings of over 125,000 twitter accounts advocating or promoting terrorist acts. Most accounts primarily relating to ISIS (the self-named Islamic State), have been flooding the social media platform. With the tail end of 2014 seeing 46,000 accounts advocating terrorism, now the numbers are in the […]

Apple Cracking Down On Repairs

The latest software for Apple iPhone 6 handhelds are responsible for the infamous “error 53“, which renders a device useless if tripped. The error occurs when the system detects any unauthorized repairs, meaning that you could only have iPhones repaired by official Apple staff. Needless to say this has not been met with a lot […]