Essential macOS High Sierra updates

The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all users.” This is a standard message in most operating system updates, but users seldom pay heed. This time, however, Apple’s latest Mac OS includes a security update that’s essential to keeping your devices safe from KRACK. Why you should update now Foremost on Apple’s list of macOS updates is the addition of 70 new emojis. Although this is exciting to some, the most compelling reason to update to the latest OS is the security patch for the KRACK WiFi security…

Read more

OneDrive’s new feature helps you save space

Don’t you just hate it when your PC gives a warning message that it’s running out of space? You’re then forced to go through all your files to figure out which are important and which ones can be deleted. Sometimes you manage to get a few megabytes back, but oftentimes you end up grabbing your external disks. But with OneDrive Files On-Demand, the issue will become a thing of the past. Microsoft has launched OneDrive’s new feature called “OneDrive Files On-Demand,” which comes with Windows 10 Fall Creators Update. This new feature allows users to transfer files to Microsoft’s cloud…

Read more

Google My Business now accepts appointments

There are countless platforms that showcase, review and link to small businesses, but few have as much impact as Google does. Although business owners can’t choose where their site ranks in the search results, they can edit information that is displayed and insert some flashy new features. How to edit your business’s Google listing When someone types your business’s name and location into Google.com, a “Knowledge Panel” is displayed on the righthand side of the search results with information about your office. If your business doesn’t have a Knowledge Panel, you can change that by opening a free Google My…

Read more

Android introduces Fast Pair

As seen with Apple’s AirPods, people today are quickly growing accustomed to wireless pairing between their smartphones and headphones. Of course, Google has been working on a solution of its own, and it has just made it to the market. What is Fast Pair? Fast Pair is Android’s new connectivity solution which uses Bluetooth technology and the smartphone’s proximity to let you connect to Fast Pair-enabled Bluetooth devices with just a single tap. How does it work? When a Fast Pair-enabled device is nearby, your Android smartphone will automatically retrieve the device’s product image and name from Google’s servers and…

Read more

Google reviews: how to make them count

Google has recently modified their search results to display ratings from review sites like Facebook and Yelp. While this may seem like a small change, it has actually made reviews more important than ever in terms of SEO. With the following tips, your company can shine in the Google search results. How Google changed search results Google’s new search algorithm is designed to lead people to high-quality products and services. For instance, if you search “Acme Group Inc.”, Google will show you something called a Knowledge Panel. Displayed on the right side of the search results, this panel includes information…

Read more

Key security enhancements in Android 8.0

Oreo is Android’s latest and greatest operating software to date. With sleek new enhancements such as a picture-in-picture functionality, smarter Wi-Fi toggling, customizable application notifications, and more, Android users have plenty to get excited about. However, its key security updates aren’t getting as much attention even though they’re just as important to the all-new Android interface. More secure booting Android’s Verified Boot feature was introduced in 2013 and has been fine-tuned since. In Oreo, it performs a quick inspection of a device’s software before it starts up. The Verified Boot functionality prevents the device from starting if it detects that…

Read more

What is “serverless” computing?

Thanks to economies of scale, cloud computing resources are cheaper and more stable than those on a local area network, but the cloud is still made up of servers that require expert configuration. Serverless computing is one way to reduce management burdens. What is it? Outsourcing workloads to the cloud — like websites and apps — requires just as much hardware as if the computations were performed in an on-site server. The only difference is the location of the server. Office 365 or Google Docs are great examples of this model. Thousands of servers are set up to run these…

Read more

Hackers exploit vulnerable Office feature

As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen. What’s the new Office threat? The Office exploit takes advantage of Microsoft’s Dynamic Data Exchange (DDE), a protocol that sends messages and data between applications. For example, DDE can be used to automatically update a table in a Word document with data collected in an Excel spreadsheet. The problem with…

Read more

Mobile devices and HIPAA compliance

Mobile devices have revolutionized the healthcare industry: They’re convenient and significantly improve work efficiency and patients’ satisfaction. Yet they also come with risks. Patient data handled by those devices can be leaked. That’s why every healthcare provider needs to be extra careful about data security when using mobile devices. Why does data security matter so much to healthcare providers? As a healthcare provider, you’re subject to regulations by the Health Insurance Portability and Accountability Act (HIPAA), which governs how medical data is stored, accessed, and transferred. HIPAA’s objective is to protect patient privacy. Under this regulation, you’re required to take…

Read more

KRACK hacks: What you need to know

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK. What is KRACK? Simply put, KRACK, short for ‘key reinstallation attack,’ allows hackers to bypass WPA2 — a security protocol used by routers and devices to encrypt activity — and intercepts sensitive data passing between the mobile device and the wireless router, including login details, credit card numbers, private…

Read more