Month: August 2019

Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company. This brief video courtesy of News24 discusses the scope of the incident, the kinds of information ...

Keep Reading

Cyber Security is Vital for Small Businesses

Small Business Tech Security Small businesses need to take cyber security seriously, preventing lapses or weak points that could lead to major data breaches or attacks.   Modern technology is rapidly changing the landscape for small businesses. Small companies can now do more and have a far greater reach, but they are also faced with bigger security concerns. What once was a big company issue is...

Keep Reading

Watch Out for Hidden Malware on Your Phone

What You Need to Know About Android Malware Hackers are devising new ways to infect phones with malware. Learn about the latest attack on Android phones and how to minimize your risk of getting malware.  Since the first computer operating systems hit the market, malware has been a serious security concern. Today, malware can infect not only desktop and laptop computers, but devices that are conn...

Keep Reading

How to Leverage iOS12 Enhancements to Boost Productivity

 How to Use iOS12 to Instantly Share Information With Colleagues Want an easier way to communicate with your colleagues? Save time and reduce errors by learning how to instantly exchange information using iOS12’s share feature.  Beginning with Apple’s release of iOS8, it has been easier to share information, files and apps with others, including colleagues. The feature continues to be avai...

Keep Reading

How to Use Your Computer to Install Apps on Your Android Device

Downloading Apps on Your Android Device: How to Use Your Computer Installing apps to your Android phone via your desktop computer (or other “unofficial sources”) is fast and easy. Learn the simple process right here.   One of the best things about Android devices is the fact that you can access and execute unique commands on your Android from other devices, such as your computer. Of course, ...

Keep Reading

Can We Still Rely On MFA?

New Phishing Attacks Make 2FA Useless All multi-factor authentication (MFA) mechanisms can be compromised, and in some cases, it's as simple as sending a traditional phishing email. The latest phishing attacks can bypass Two Factor Authentication (2FA) protection without being noticed. Google researchers are seeing more phishing attacks that are 2FA-aware. Attackers know that organizations are...

Keep Reading

What Do You Need To Know About The Capital One Breach?

The Capital One Breach Capital One said that personal information of more than 100 million people and small businesses who applied for credit in the U.S., and 6 million in Canada, was breached. The largest category of information accessed was information on consumers and small businesses who applied for one of Capital One's credit card products from 2005 through early 2019. Personal informatio...

Keep Reading

Will Your Business Be Impacted by the End of Microsoft Exchange 2010?

Will Your Business Be Impacted by the End of Microsoft Exchange 2010? Exchange 2010 has been a great program for businesses for many years, but its time is now winding down. Find out what this means for your business.  All good things must come to an end. For Microsoft Exchange 2010, that end will happen at a date in the very near future: January 14, 2020. Migrating away from an integral piece o...

Keep Reading