Explaining the concept of virtualization is no easy task, and failed attempts to do so have left it with an undeserved reputation. We want to set the record straight about this technology’s many benefits by dispelling the four most common misconceptions.
Virtualization: Common misconceptions
What are the Security Risks of USBs and other Network Additions?
This is the seventh in a series of eight articles focusing on practical ways to block key Cyber Crime Gateways.
If you found a USB drive in a parking lot, what would you do? Would you pick it up and plug it into your computer to see who it belongs to and what's on it? Researchers from Google wanted to know how many people would do just that if they littered 297 USB drives around a college campus.
CEO Article: A Race We Can Win…Together
This past month our team participated in the American Cancer Society's Relay for Life. Thank you to all who participated, organized and carried out this event. It is likely that all of us connect, in some way, to the ravaging effects of cancer. As a team, we remember Kristian--Geoff's (our head engineer) younger brother and one of our first and brightest engineers--with this event.
Remote working is better with VoIP
Office 365 will block Flash by 2019
If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of the past. Over a week ago, Microsoft announced that Office 365 would completely block said media by January 2019.
Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content.
Tips and tricks on Windows 10
Are you making the most out of your Windows 10 computer? If you haven’t tried adjusting system and battery performance, silenced notifications, or used the night light function, then you’re missing out on minor but useful features.
Performance/Power slider
There are two kinds of computer users: those who value battery longevity and those who prefer optimized system performance.
Mitigating healthcare insider threats
First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents.
Nation-state hackers inflict destructive malware
Can the “Black Dot” bug be fixed?
People who use iPhones, iPads, and Macs are at risk of encountering a Unicode attack that can cause the messaging app to crash and lock up the device. The good news is a workaround has been found which can restore the state of said Apple products.
What is going on?
A bug, known as "Black Dot,” is locking the messaging app on Apple devices running iOS 11.3 and 11.4 beta with Apple TVs and Apple Watches also at risk.
How to configure your new Windows 10 laptop
First things first, what should you do with your brand new laptop? You go through the Windows 10 setup, and you're all done, right? Not really. Your notebook isn’t ready -- until you do some tweaking. Let's get the ball rolling.
#1 Check for updates
Your new laptop should check for updates automatically, but you can also check manually.