Cybersecurity & IT Insights
iOS 11 and Email: A Reminder of the Dangers of Brand New Software
With more than 700 million iPhones in use, it’s easy to think that when a new version of iOS (the phone’s operating system) is released all of the major problems will have already been ironed out. Despite the best efforts of software designers, however, it’s...
The Most Useful Keyboard Shortcuts
Keyboard shortcuts can save a few seconds here and there, but if you add that time up, the most productive ones can save you hours of your life. Unfortunately, most keyboard shortcuts lists are full of complex shortcuts - it’s impossible to remember these lists, and...
Passphrase – The Less Frustrating Cousin of a Password
Computer passwords are a double-edged sword. If you make it too complicated, you’ll forget it. On the other hand, if you make it too simple, it’s relatively easy for anyone in the world to crack, and data theft is extremely common. In fact, it’s so common that most...
Three Questions to Answer Before You Spend a Penny on a Server Replacement
Server replacements only come around every five years or so for most companies, which is a good thing given the high costs of replacing them. And while the servers themselves are expensive, they represent only a fraction of the costs incurred. Replacing a server...
Beware Of a Single Point of Failure
Information Technology professionals frequently talk about the dangers of having a single point of failure. If your data isn’t backed up (and if those backups aren’t tested), you will eventually lose some of it, and there’s a good chance that some of it will be...
Ransomware and Malware Prevention is About User Training, Not Technology
Ransomware and other types of malware arrive on computer networks from several different sources. Some of it is downloaded via links in phishing emails, which are designed to look like they are legitimate but are not. Some links arrive through malicious websites or...
Two Things Every Managed IT Service Plan Needs
Have you ever taken a look at a proposal from a Managed Service Provider (MSP) and wondered if it covers everything your company needs? Some specifications may need to be gathered during the pre-proposal discovery process – for instance, the type of coverage for...
Microsoft 365: A (Confusing) New Product from Microsoft
Six years after releasing Office 365, Microsoft has announced another completely different product named Microsoft 365. If that’s not confusing enough, Microsoft 365 isn’t a new product at all, but a relaunch of the Secure Productive Enterprise. Here’s what you need...
An Update on the Petya Ransomware Attack
Only a few weeks after the WannaCry ransomware attack, another one is rapidly affecting computers across the globe. This new ransomware, a variant of Petya, originated in Ukraine less than 24 hours ago and has already hit computers in more than 60 countries. Well...