Uncategorized
Follow Me: Windows 10 Cortana enhancements
Windows 10 users heavily rely on the Tips and Get Started features to assist them. Good news could be coming their way with a possible launch of a Cortana-guided feature called ‘Follow Me.’ Should ‘Follow Me’ become a reality, users will benefit from more thorough assistance. Possible new Cortana features Cortana can perform several tasks,…
Read MoreHackers KRACK WiFi security
For ages, most people assumed that setting a strong password on their WiFi router was enough to prevent cyberattacks, but recent events prove otherwise. Two Belgian security analysts have found a serious weakness in WiFi networks, called KRACK, that puts your wireless devices in danger. What is KRACK? Simply put, KRACK, short for ‘key reinstallation…
Read MoreApple Pay: Safe and secure transactions
It was only a matter of time before our smartphones replaced our wallets. There are several mobile payment systems available today, but Apple Pay is one of the safest and easiest to use for small businesses. Read on for more details on why you should consider it. How does it work? Credit card transactions are…
Read MoreCisco to predict IT failures using AI
Mark Zuckerberg and Elon Musk are not the only ones dabbling with AI and machine learning. According to Cisco, these technologies might be key to the future of IT system management and business continuity, both of which have grown increasingly complex over the years. Artificial intelligence (AI) and machine learning are extremely useful in helping…
Read MoreThe right way to set up guest Wi-Fi
Customers, partners, and vendors expect internet access when they’re visiting someone else’s office. This is why guest Wi-Fi access is so common. But setting it up the wrong way can create a frustrating experience for people looking to connect and leave your company exposed to attacks. Here’s how to do it right. Never give guests…
Read MoreProtect your devices with virtualization
With cybersecurity threats targeting small and large businesses, solutions that protect mobile devices are no longer a niche service. More work is being handled away from the office, which means more opportunities for security breaches. Virtualization vendors are leading the charge to tackle these challenges with innovative solutions. Mobile device management and virtualization Simply put,…
Read MoreUpdated Microsoft Office coming soon
Which version of Microsoft Office does your company use? 2010? 2007? Even the newest versions of Word, PowerPoint and Excel are from three years old, which makes an Office upgrade a worthwhile consideration. Read on for updates on Microsoft’s newest productivity platform. Microsoft Office 2019: release and features For the past ten years, Microsoft has…
Read MoreExciting updates from Microsoft’s conference
In Microsoft’s latest conference, the company has launched brand new software bundles together with bargain-priced Windows devices for schools and businesses; but announced that Skype for Business has seen its day and will no longer be supported. Read on for more details. Good news for schools and educators Microsoft recently rolled out Microsoft 365 for…
Read MoreYour passwords are not secure
A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today — the combination of letters, capitalizations, and numbers — NIST admits that the existing guidelines…
Read MoreNew vulnerability discovered in High Sierra
The macOS operating system has a reputation for being impervious to security risks, but according to recent news, that’s not always the case. In High Sierra, even someone with zero IT experience can steal your password. Here’s how to stop them. What is the bug? The vulnerability pertains to sweeping changes in how macOS stores…
Read More