Category: Blog

Privacy Alert! Disclosure of Personal Data

Pretending to be a “geneology” website, FamilyTreeNow.com has a lot of personal information like your birth date, home address, phones, relatives and more. Anyone can get too much personal information

Ransomware is About to Get a Lot Worse

Ransomware has unfortunately been shown to be an effective way to target not only businesses large and small alike, but hospitals, police, individuals – virtually everyone.  It is effective because

Encryption in Office 365

used with permission from Microsoft Office 365 Message Encryption is an easy-to-use service that lets email users send encrypted messages to people inside or outside their organization. Designated recipients can

How to Turn Off Clutter in Outlook / Office 365

Clutter is a mailbox management feature of Office 365 for Business. (If you don’t have an Office 365 for Business subscription, you will not have this feature.) It analyzes how

Who’s the weakest link?

used with permission from HP Technology at Work Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that

4 ways to be more proficient in Word 2016

used with permission from Microsoft US Small and Midsize Business Blog #1 Co-author in real time with your team When you and your team members want to collaborate on a

How Safe Is Surfing on 4G vs. Wi-Fi?

used with permission from Norton by Symantec, by Nadia Kovacs You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of

Rise in Ransomware Attacks

There has been a significant increase in activity by a malicious ransomware software called Troldesh. We have recognized that systems that are not actively managed or have no system access