Contact Us Today!

System Views vs My Views – Part Two of Two

Sharing "My Views" with Teams
In Part One, I talked about the differences between System Views and My Views. I also mentioned that whenever possible to filter by dynamic values (current user, manager, territory, last month, next year, etc.).

What if you work for a company that has several different divisions and your user base works across multiple divisions? They would want to have access to their views but they don't necessarily have to see all of the views for all of the other divisions.

How to Keep Your Mobile Devices Safe

Increased productivity and constant collaboration are two of the main reasons why businesses have integrated a mobile security policy into their business. This means an increased use of mobile devices such as smartphones and tablets in daily operations.

Help, my Office 365 account was hacked!

So you just got a call from one of your clients telling you that they received a strange e-mail from you with an attachment.  You know you haven't e-mailed them in days.  What could be going on?  You check your sent mail folder and to your surprise there are hundreds of sent messages to everyone in your contact list.

Steer clear from these types of malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.

Beware: Nyetya is worse than WannaCry

The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history. Like WannaCry, its attackers exploited unpatched Microsoft vulnerabilities and demanded a $300 ransom in Bitcoins.

Worrying evidence of poor router security

Adding to the list of reasons to outsource your network security to a certified IT provider, a recent CIA leak shows just how vulnerable most network routers really are. Read on to learn why this is such a big vulnerability and what you can do to fix it. The Wikileaks CIA documents For several months, […]

PC fixes are a drain on your company’s budget

Security professionals should be beefing up your network security, implementing advanced firewall software, and identifying risks for possible breaches. In reality, they spend a huge chunk of their time troubleshooting issues on individual personal computers (PCs). That workflow is not ideal, but that’s what normally happens in many organizations. At what cost? Read on to […]

Lessons learned from the WannaCry malware

WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability of their data. If you’re still worried about whether you’re at risk, we’ve collected everything you need to know right here. Ransomware review Ransomware is a specific type of malware […]

This fake Google app is really a phishing scam

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done. Even well-trained users are falling for the most recent ploy, […]