Blog

Wikileaks details router vulnerabilities

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.
The Wikileaks CIA documents
For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

Standing Tall with Creators Update

Standing Tall with Creators Update

This past April, technology allowed us to usher in a member of the next generation—April the giraffe and her calf!  Much like in the animal kingdom, new technology is being developed and born into the digital world every day.  New technology, much like baby animals, needs time to grow and mature into their fully developed potential.

Important Office 365 Upgrade

Important Office 365 Upgrade

If you wished Microsoft would streamline its Office 365 ProPlus update schedule, your prayers have been answered. The cloud solution, which includes the Enterprise E3 and E5 plans, will be updated twice a year, rather than three times a year. Here’s everything you need to know about the new ProPlus update schedule.

Cleaning Out Our IT Habitats (Part III)

Cleaning Out Our IT Habitats (Part III)

Enhancing the security of your online accounts is important for staying safe online.

Turn on two-factor authentication on critical accounts like email, banking and social media.
Secure your router by making sure it has a strong password and does not broadcast who you are through its name (e.g., “the Jones Family” or “123 Elm Street”).
Make better passwords by combining upper and lower case letters with numbers and symbols.

The cloud is more secure than you think

The cloud is more secure than you think

Even to this day, the perception of cloud technology suffers from a reputation for bad security. But as time goes on we’re beginning to see that cloud security is almost always better than that of local area networks. So whether you’re considering a cloud web server or internet-based productivity software, take a minute to learn why the cloud your best option.

What’s Your Firewall Against Extinction?

What’s Your Firewall Against Extinction?

Like it or not, the world’s biodiversity is diminishing.  Fortunately, zoos are playing a greater role in preventing the extinction of species in nature—in effect, they have become firewalls against extinction.  Zoos provide naturalistic habitats for animals that give the illusion of open access, but both the animals and the visitors are protected.

WannaCry: A historic cyberattack

WannaCry: A historic cyberattack

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.