Blogs

Browse through our most recent articles to gain expert advice and recommendations for great hardware and software

What is Two Factor Authentication?

What is Two Factor Authentication?   One of the easiest, cheapest and best ways to increase your IT security is to use something called 2FA – or two-factor authentication.   2FA is also known as MFA (multi-factor authentication) or OTP (one-time password).   What does 2FA do?   Two-factor authentication adds a second layer of […]

Read more

What is a VPN?

In this guide, I will explain what a VPN is and what it does in a non-technical way.   Before we talk about what a VPN does, it might be helpful to explain what problem a VPN cures.

Read more

What happens after Windows 7?

Windows 7 is now approaching its 10th birthday, and Microsoft has announced that it will become end-of-life (EOL) on 14th January 2020. What will happen on 14th January 2020? If you’re using a Windows 7 computer after this date, then nothing visible will happen.

Read more

Spectre makes a comeback

When one cyberattack is stopped, another more powerful variant almost always takes its place. It happens all the time with ransomware, computer viruses, and Trojan horses. Recently, this has become the case with Spectre attacks, which exploit a fundamental flaw in modern computer chips. Here’s everything you need to know. Spectre 101 For those who […]

Read more

IT policies to protect your business

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we’ve suggested a few IT policies you should implement to protect your business. Internet In today’s business world, […]

Read more

Assess risks before buying new software

Cybersecurity is an issue that hounds businesses of all types. Sometimes organizations invest in security software without realizing the risks that come with it. Here’s why identifying threats before buying cybersecurity products is paramount. Uncover threats and vulnerabilities Every business should evaluate the current state of its cybersecurity by running a risk assessment. Doing so […]

Read more

SMB routers targeted by VPNFilter malware

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter recap A team of security […]

Read more

Chrome: From HTTP to HTTPS

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward […]

Read more

Office 365 will block Flash by 2019

If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of the past. Over a week ago, Microsoft announced that Office 365 would completely block said media by January 2019. Microsoft recently announced plans to eventually stop the […]

Read more

Mitigating healthcare insider threats

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents. #1 Educate – The workforce (meaning all healthcare […]

Read more