Category: Blog

Rise in Ransomware Attacks

There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access

Three top tips for Microsoft Outlook

used with permission from Microsoft US Small and Midsize Business Blog, by Cindy Bates Outlook has email, calendar, contacts and task management to help you communicate and stay organized. Here

How to bookmark in a web browser

If you want to save a webpage, or just “bookmark” it so it’s easier to find later – this is how you do it in three common web browsers! First

The wild world of 3D printing

used with permission from HP Technology at Work As you may have heard, 3D printers are going beyond the simple plastic creations we’re already familiar with. Way beyond. Scientists, engineers,

How a Gmail Password Stealing Scam Works

used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods.

What is Grayware, Adware, and Madware?

used with permission from Norton by Symantec, by Nadia Kovacs If you’re like most Internet users, you’ve never even heard of grayware, adware or madware. That’s because these are all

Ransomware on the Rise

Ransomware has been making big news lately. What is ransomware? The crooks scramble (encrypt) your files so you can’t use them, and then demand money to unlock your files. It