Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, a VPN is a group of servers you connect to via the internet. Once you’ve established a connection, your computer acts as if it’s on the same local connection as the VPN, making it seem like you moved to a different location. When you surf the web through a VPN,…

Read more

Key points from Protenus’ new report!

In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in healthcare. Here are a few key takeaways. Insiders are a bigger threat than hackers Protenus is one of the largest security vendors for electronic health records (EHRs) and their mid-year review sheds some important light on the most common types of security breaches in healthcare. Figures were calculated based on reported incidents to the U.S. Department of Health and Human Services (HHS), the media, and state attorney generals. Here are several key findings all pointed towards one direction; those being:…

Read more

Useful keyboard shortcuts for Mac users

Did you recently switch from Windows to Mac? If so, you’re probably still getting used to the Apple keyboard. The good news is it’s only slightly different from a non-Apple keyboard. The bad news is you’ll have to learn a whole new set of shortcuts. Although some basic shortcuts are the same in both Apple and Windows computers, there’s plenty more that you ought to use. Minimizing (or ‘Docking’) the front app window: Command M Use this combination when you have several apps, browsers, or Finder windows open and want to minimize the active one. To minimize all open windows…

Read more

How to extend your laptop battery life

These days, we get a lot of our work done on laptops, which means battery life is a huge priority for any laptop user. Wouldn’t it be good, then, to learn how to prolong the life of your laptop battery? Here are a few useful tips to do just that. Some truths about your laptop battery Batteries in many devices nowadays are lithium-based — either lithium-ion or lithium-polymer — so users must take note of the following guidelines for their proper maintenance: They can’t be overcharged, even though you leave your battery plugged in for a long period of time.…

Read more

Google improves Chrome’s security settings

Most web browsers have built-in security measures to protect users, but some of those aren’t enough to ward off unwanted software. To improve Chrome’s security, Google rolled out some changes in its Chrome Cleanup tool for Windows. Here’s how the enhanced tool protects you. Detect hijacked settings Many users prefer to enhance their browsing experience by installing extensions or plug-ins, some of which could be malicious. When these extensions are installed, they could inject harmful ads into web pages or allow access to third-party servers without the user’s consent. Google’s new hijacked settings detection function prevents this from happening. Once…

Read more

Microsoft’s new productivity apps are live

In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users. Take a minute to learn about what they can do for your team! Microsoft Invoicing Word and Excel have hundreds of templates for generating company invoices, but this new app does much more than just create documents. Invoicing allows you to store the names, descriptions, and prices of your products and services in a connected database. You can also…

Read more

How do idle VMs cost businesses

Thanks to virtualization software, the time it takes to bring virtual machines (VMs) online is faster than ever. You could deploy a fleet of them in minutes, but as with most technologies, there are some drawbacks. Experts say too many VMs can cause a logistical nightmare and cost your business a lot of money. The dangers of VM sprawl VM sprawl is a phenomenon that occurs when there are too many virtual machines on a network. Although VMs can be deployed quickly, it’s important to understand that they have the same licensing, security, and compliance requirements as your other computers…

Read more

How to connect accessories on Android

Did you know that you can connect a mouse to your Android tablet, or even an Xbox 360 controller to play a game console-style? The truth is many Android devices support a wide range of accessories. Here’s everything you need to know. USB keyboards, mice, and gamepads Android phones and tablets don’t come with standard, full-size USB ports so you can’t plug a USB accessory directly into it. To connect, you’ll need a USB on-the-go (OTG) cable, which is simply a micro-USB adapter that can be purchased from any computer store for a couple dollars. From there, your accessories should…

Read more

Outlook on Mac and Windows gets redesigned

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes. How Outlook will be simplified The most notable feature of the new Outlook will be a simplified navigation bar along the top of the screen, which means less of the screen will be reserved for formatting and organizational options. However, you can still add more buttons to…

Read more

Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results. The results From March 2016 to March 2017, Google and UC Berkeley researchers examined three main ways hackers hijack accounts: Keylogging software – a malicious program that records computer users’ keystrokes Phishing emails – to lead people into dangerous websites Stolen passwords – available to the highest bidder In just one year, Google found 788,000 successful keylogging…

Read more