Written by: Jay H. Staying connected nowadays is easier than ever. Businesses, hotels, restaurants, and even entire cities offer public Wi-Fi hotspots for guests to get online. However, connecting to these hotspots comes with risks. Ideally, you’d never connect to public networks and instead use your mobile device as a hotspot, but sometimes this may be impractical. Let’s discuss why
Written by: Jay H. Attackers make 96 percent of phishing attempts through email, according to Verizon. Given that over 300 billion emails are sent every day, a staggering amount includes spam and malicious emails. Email is the most common business communication tool, so when phishing emails make it through the filters, they pose a severe risk to your organization. To combat
Written by: Jay H. When you need to buy software for your SMB, the process seems straightforward. Just set your organizational goals, your budget, and then find the best software that meets your needs, right? Unfortunately, the reality is far from that. A recent study from Capterra reveals that more than 70 percent of SMB software purchases either compromise on
Written by: Jay H. We all know the importance of proper password management. However, despite knowing the risks, at least 65 percent of people reuse passwords across multiple, if not all, sites. It’s difficult to blame them, given that the average person has 70-80 passwords to remember, according to research by the password manager Nordpass. “We now partly understand why
Written by: Jay H. Zoom has announced various new Zoom Room features that will help organizations safely transition back into the workplace. The traditional workforce has evolved, and Zoom meets the challenges of supporting in-office and remote workers simultaneously.” Whether it’s in an office, co-located space, remote location, or at home, Zoom’s platform enables organizations to put employee health and safety
Written by: Jay H. You’re at work and you get a pop-up notification for an app update. Without much thought, you quickly click on ‘Remind me later,’ knowing that you’ll repeat this when the notice reoccurs. Sound familiar? Although it may not seem significant, patch management is one of the most critical IT tasks in an organization. In fact, neglecting
Written by: Jay H. Ransomware entails an attacker infesting their victim’s computer with malware that encrypts their data. Then, the hacker forces the victim to pay a ransom or risk losing the data forever. Once thought of as a rare event, ransomware is becoming increasingly common and costing organizations billions. Now, hackers are more commonly threatening to expose the company’s
Written by: Jay H. Ask anyone what the most notable story was for 2020, and they will likely tell you it was the coronavirus global pandemic. However, a massive digital transformation also took place, with cybercrime rates spiking to all-time highs. Cybercriminals directed ransomware attacks at sensitive industries such as health care, education, and government institutes. Unfortunately, these attacks show
Written by: Jay H. One year after Microsoft ended support for Windows 7, over one hundred million PCs are still running the operating system. Although Microsoft has been pushing users to upgrade to Windows 10, many stragglers have adamantly resisted the change. According to ZDNet, roughly 200 million PCs were running Windows 7 after Microsoft officially ended support for the
Written by: Jay H. On January 12, 2021, Adobe officially pulled the plug on its renowned Flash Player web browser plug-in. Now, instead of displaying Flash content, users see a warning advising them to uninstall Flash Player. Once a crucial part of the early Internet, the media player has suffered a slow end since Adobe announced their plans to eliminate