Well Worth a Read!
In this issue:
- Where the Wild Things Are
- Introducing… Jeff Kaminski
- IT’s Time to Grow Up
Well Worth a Read!
In this issue:
When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.
The Wikileaks CIA documents
For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.
This past April, technology allowed us to usher in a member of the next generation—April the giraffe and her calf! Much like in the animal kingdom, new technology is being developed and born into the digital world every day. New technology, much like baby animals, needs time to grow and mature into their fully developed potential.
If you wished Microsoft would streamline its Office 365 ProPlus update schedule, your prayers have been answered. The cloud solution, which includes the Enterprise E3 and E5 plans, will be updated twice a year, rather than three times a year. Here’s everything you need to know about the new ProPlus update schedule.
Enhancing the security of your online accounts is important for staying safe online.
Turn on two-factor authentication on critical accounts like email, banking and social media.
Secure your router by making sure it has a strong password and does not broadcast who you are through its name (e.g., “the Jones Family” or “123 Elm Street”).
Make better passwords by combining upper and lower case letters with numbers and symbols.
Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate data protection on smartphones, the National Security Agency (NSA) believes virtualization is the key to true security.
Even to this day, the perception of cloud technology suffers from a reputation for bad security. But as time goes on we’re beginning to see that cloud security is almost always better than that of local area networks. So whether you’re considering a cloud web server or internet-based productivity software, take a minute to learn why the cloud your best option.
Bluetooth technology helps simplify our daily lives — it allows for hands free communication, a quick and easy way to share content with friends, family, colleagues, and more. In fact, 45 percent of Americans have Bluetooth enabled across multiple devices.
Like it or not, the world’s biodiversity is diminishing. Fortunately, zoos are playing a greater role in preventing the extinction of species in nature—in effect, they have become firewalls against extinction. Zoos provide naturalistic habitats for animals that give the illusion of open access, but both the animals and the visitors are protected.
No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.