KRACK hacks: What you need to know

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK. What is KRACK? Simply put, KRACK, short for ‘key reinstallation attack,’ allows hackers to bypass WPA2 — a security protocol used by routers and devices to encrypt activity — and intercepts sensitive data passing between the mobile device and the wireless router, including login details, credit card numbers, private…

Read more

How does Apple Pay work and is it secure?

Apple Pay is a way for iPhone and iWatch users to make credit card payments using only their mobile device. Although it’s incredibly simple to use, some small businesses are worried about whether accepting these digital payments will add to their data security burdens. However, once you understand how it works, you’ll see just how easy it is to manage. How does it work? Credit card transactions are more complicated than most people realize. There are a few middlemen between the merchant you purchase from and the bank that issues your credit card. Apple Pay simplifies the payment process by…

Read more

Cisco introduces new AI services

Modern IT systems are generating more data than ever before, and humans can’t keep up. Thankfully, certain tasks have already been offloaded to machines. Even better, Cisco may have a long-term solution to IT management complexities. Artificial intelligence (AI) and machine learning are extremely useful in helping us sift through massive amounts of information, and networking behemoth Cisco recently announced that they will be incorporating these technologies with two of their services. Business Critical Services This suite of services uses AI-powered automation, compliance, security, and machine learning analytics tools to reduce the complexity of IT systems management. It helps monitor…

Read more

Here comes Dropbox Professional

Lack of storage space is something we all have to deal with at some point. You’ll be forced to delete some seemingly unnecessary files, only to find out that you actually needed them later. What would you do? Dropbox offers a quick fix with its new Professional plan. Read on to learn more. Stop worrying about storage space Gone are the days when you have to regularly remove, relocate, or reorganize files stored on your hard disk because there’s not enough space. Dropbox has recently introduced a new plan, Dropbox Professional, aimed at self-employed professionals and entrepreneurs. And it comes…

Read more

Guest Wi-Fi 101

No matter who they are, people today expect Wi-Fi access when they’re guests of your office. Setting up your Wi-Fi the wrong way can create a tedious experience for them and even expose your confidential information. So what’s the right way to do it? Never give guests access to your primary Wi-Fi While giving guests password to your company’s main Wi-Fi might be the easiest way to get them connected, you should avoid this at all costs. Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. Not to mention, guests’ devices connected…

Read more

Microsoft Edge goes mobile

Microsoft Edge is a great browser — it’s fast, clean, and has every feature you need. But alas, few people use it. So in an attempt to encourage PC users who also own an Android or iOS device to use Edge, the company is moving the browser to mobile platforms. Read on for more details. Why Microsoft is expanding Edge to mobile Microsoft’s Windows Phone is dead. So as a new mobile strategy, Microsoft has decided to bring the Edge browser to iOS and Android phones in hopes of expanding the browser’s reach. Doing so helps with Microsoft brand recognition,…

Read more

Secure mobile devices with virtualization

Mobile device security is paramount in today’s unpredictable IT landscape. There are plenty of ways to be sure your employees are accessing data safely away from the office, but there is one solution we recommend for the best results: combining mobile security efforts with virtualization technology. Mobile device management and virtualization Simply put, mobile device management (MDM) is about controlling how users on any device — from laptops to internet-connected printers — view, share, and store sensitive information. For example, if you have a user who accesses data via a company-provided laptop, an office copier and a personal smartphone, IT…

Read more

Office 2019 is on its way

As a convenient cloud solution, Office 365 boasts nearly 30 million users. But that’s nothing compared to licensed versions of Microsoft’s productivity suite, which have more than one billion users. Office 2019 was announced in September and it will mean big changes for businesses that want simpler versions of Word, PowerPoint, Excel and more. Microsoft Office 2019: release and features For the past ten years, Microsoft has updated its suite of productivity software every three years. The current version is Office 2016, and in sticking with the schedule Office 2019 will be available for purchase at the end of next…

Read more

Re-secure your passwords!

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. Now retired, the author admits that his document was misguided. Find out why and what great passwords are made of. The problem The issue isn’t necessarily that NIST advised people to create passwords that are easy to crack, but it did steer people into creating lazy passwords, using capitalization, special characters, and numbers that are easy to predict, like “P@ssW0rd1.” This may seem secure, but in reality, these strings of characters and numbers…

Read more

macOS High Sierra gives away your password

A glaring security mistake has been discovered in Apple’s most recent desktop operating system. It’s not the sort of vulnerability that requires complicated malware or IT knowledge; anyone can learn this exploit in a matter of minutes to steal your password. Here’s how to stop that from happening. What is the bug? The vulnerability pertains to sweeping changes in how macOS stores files. In the High Sierra update, the Apple File System (APFS) was introduced to make opening and saving files much faster. As an added bonus, APFS also added advanced features like drive encryption. However, users who add a…

Read more