Mac ransomware and how to defeat it

Although most ransomware is designed to attack Windows systems, a new strain is targeting Mac computers. Discovered last month, Mac ransomware OSX/Filecoder.E was found by researchers to behave just like any cryptolocker variant. It would encrypt all data until victims ...

OMS: The best way to organize online sales

There are so many variables that go into order fulfillment and shipping that it’s no wonder an entire field has sprung up around streamlining these processes. If you’re looking for a great way to add value to your business, an ...

Cloudbleed: Your data could be at risk

A small error in Cloudflare’s code has spilled millions of login credentials, personal information, and cookies all over the internet. The bug, known as Cloudbleed, was discovered by the internet security company last month, and since then, they have worked ...

Mobile malware on Android apps

Smartphones are basically palm-sized computers. As such, they deserve the same protection as desktops and laptops. While there is no need to install bulky security software to protect against cyber threats, there are steps users can take to prevent cybercriminals ...

Utilize Snapchat for business growth

Businesses nowadays are focusing their marketing efforts towards social media. Precious time and money are being invested in expanding customer base, establish corporate identity, and drive revenue. That’s why it’s vital for owners to know which platforms work, and which ...

SDN & virtualized networks: how they differ

We’ve talked about network virtualization on this blog before, but there was some recent confusion over whether or not that service is different from software-defined networking. It’s not a big difference, but no, they’re not the same. Let’s take a ...

Office 365: What plan is the right one?

There’s a lot to like about Office 365. You have access to cloud-based productivity suites, Microsoft email servers, SharePoint, and more. But not all Office 365 license plans offer the same features and services. When looking for an Office 365 ...

Four helpful Cortana commands

Like Apple’s Siri and Google’s Google Now, Cortana is an intelligent personal assistant that assists you with a variety of tasks such as making phone calls, setting reminders, as well as searching for files. All of this is possible, with ...

Fileless malware: who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic...yet. Getting acquainted with this new malware today could save you ...

Russian hackers target Mac OS X users

While plenty of malware target Windows and Android operating systems, Apple products also get some unwanted attention from cybercriminals. In February, Fancy Bear, the Russian hacking group accused of leaking information from the US Democratic National Committee, have created advanced ...