Blog

Cryptojacking: How to protect yourself

Cryptojacking: How to protect yourself

Over time, your computer will work slower as software requirements become more demanding. But if you have a relatively new computer, and are experiencing performance problems after clicking a link or visiting a website, you might be the victim of a new cyberattack scheme known as cryptojacking.

Cortana Improves Business Productivity

Cortana Improves Business Productivity

With so many affordable IT tools on the market, it’s a great time to be a small-business owner. Most of them are basic and won’t require much training, too, so you don’t have to be tech-savvy to use them effectively. All you have to do is find the right one for your particular goals and needs.

What you need to know to select a VoIP service

What you need to know to select a VoIP service

Voice over IP (VoIP) technology epitomizes every small-business owner’s IT goals. It’s affordable, flexible, and full of features that make it a valuable long-term investment. There are countless worthwhile VoIP options. You just need to know your priorities and what to look for.

Office 365 enhancements for iOS and Mac

Office 365 enhancements for iOS and Mac

Good news for Office 365 subscribers who use Apple devices: Microsoft apps now seamlessly integrate with the Apple ecosystem, which means working on documents is now much easier on an iPhone, iPad, and Mac. Here are some of those key capabilities.

Co-authoring in Word, Excel, PowerPoint

Apple users can now co-edit documents in Word, Excel, PowerPoint, and Outlook.

How to turn off intrusive Windows 10 settings

How to turn off intrusive Windows 10 settings

With Cortana following you around — from spamming helpful suggestions based on what you’re typing to displaying extremely precise and personalized ads based on your online search — Windows 10 can often feel intrusive. Here are a few tips you can follow to leave Microsoft’s watchful eye behind.

Distributed spam hides illegal activities

Distributed spam hides illegal activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails.

Virtual DR: The best anti-ransomware tool

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against future ransomware.

Skype offers end-to-end encryption feature

Skype offers end-to-end encryption feature

Transmitting voice conversations over an internet connection can be risky, with no way of knowing whether or not anyone is tapping your calls. In response to this concern, Skype has just released a new feature that can encrypt all conversations, ensuring more privacy when calling or texting.