Contact Us Today!

5 Tips for securing your email account

Email is one of the best things the internet has made possible. We use email to signup for websites, apply for jobs, make payments, and many more. But email users also run the risk of account hijacking, malware attacks, and other cyberthreats. To secure your email accounts, follow these crucial tips.

What exactly is proactive cybersecurity?

Most managed IT services providers (MSPs) promise proactive cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.

WPA3 Wireless Security

Wireless networking isn’t going anywhere, and neither are the “bad guys” who are interested in penetrating your wireless network security. For this reason, we have wireless encryption like WEP, WPA, and WPA2. The next best thing is here, WPA3. Listed below are some great new features.

Tips to Protect Your Smartphone

In today’s world, almost everyone owns a smart phone device. Not only do cyber criminals want to hack into your computer, they also want to gain access to your phone. Many people fail to realize that just because your phone is close by your side and not in someone else’s’ possession, that your information is safe and secure.

Office 365 will block Flash by 2019

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good.

System Views vs My Views – Part Two of Two

Sharing "My Views" with Teams
In Part One, I talked about the differences between System Views and My Views. I also mentioned that whenever possible to filter by dynamic values (current user, manager, territory, last month, next year, etc.).

What if you work for a company that has several different divisions and your user base works across multiple divisions? They would want to have access to their views but they don't necessarily have to see all of the views for all of the other divisions.

Help, my Office 365 account was hacked!

So you just got a call from one of your clients telling you that they received a strange e-mail from you with an attachment.  You know you haven't e-mailed them in days.  What could be going on?  You check your sent mail folder and to your surprise there are hundreds of sent messages to everyone in your contact list.

Steer clear from these types of malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.