Take a look at Outlook.com’s new features

Are you looking for a business email service provider? A convenient option would be Gmail, which lets you sync your emails easily with Google applications. But if discreet ads, a cleaner design, increased storage, and other productivity enhancements sound appealing to you, we recommend taking a look at the following new Outlook.com features. Easy elimination of unwanted emails Employees spend an excessive amount of time poring through both important and junk emails. In the redesigned Outlook.com, it takes only three clicks to block unwanted emails, helping you to organize your mailbox better and faster. Simply click on the Sweep function…

Read more

Is your business ready for hurricane season?

In late August 2017, Hurricane Harvey caused widespread power outages and floods across Texas and certain parts of Louisiana. Weeks later, Hurricane Irma hit the coast, affecting Florida, Georgia, and South Carolina businesses. Now, experts are saying there are more storms to come, which is why you need a good disaster recovery (DR) plan that has you prepared for the worst. Pay attention to location First and foremost, your backup site should be in a hurricane-free zone. Ideally, your offsite facility should be located at least 100 miles away from your main location. If this isn’t possible, make sure it…

Read more

Facebook faces devious adware

When you receive an email from an unfamiliar source urging you to click on a link or download a file, it’s easy to send it straight to the bin due to its spam-like nature. It’s a completely different story when the message is sent via Facebook Messenger by one of your friends. Such is the case with the latest social engineering scheme, and here’s what you need to know to stay safe. What is it? Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when…

Read more

Ransomware is coming to your Android

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware needs to be installed on your device before it can do damage. For Android devices, this means mobile apps that hide their true intent. There are two ways to install programs on your mobile device: downloading them from app stores like Google Play and Amazon…

Read more

5 Simple ways to cut your printing costs

It may not seem as though your printing infrastructure is costing your business a great deal. But if left unmanaged, you could end up with an overinflated IT budget dominated by equipment maintenance and hardware and supplies purchases. Here are some ways to avoid that. Replace outdated printers Outdated and cheap printers may be functional, but they are putting a huge dent in your IT budget. Any piece of equipment that is seven years old (or older) requires frequent repairs and causes more trouble than it’s worth. Because old printers are no longer under warranty, fixing them is more costly…

Read more

Benefits of virtualizing Windows on your Mac

A common reason for running the Windows operating system (OS) on a Mac computer is to bypass compatibility issues. Virtualization is the only way to efficiently install OS-specific software on any machine, so let’s go over some of the ways this solution creates synergy between the two platforms. Configure an entire machine with a few clicks With programs like VMware and Parallels, installing Microsoft’s OS on your Mac is almost as easy as creating a new document in Office. The process varies between vendors, but it’s usually akin to clicking File and New and then choosing between Windows XP, 7,…

Read more

Watch out! More ransomware attacks incoming

Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks. Using old tricks The new ransomware strain, known as ‘IKARUSdilapidated,’ behaves the same way as other Locky variants. Hackers use carefully crafted emails to trick users into downloading and opening a ransomware-infused docx, pdf, jpg, or zip file that has the power to encrypt all local files. Even filenames are converted into…

Read more

OneNote: the hidden gem in Microsoft Office

Almost everyone loves PowerPoint, Excel and Word, but there’s another Office application that should be recognized as a must-have: OneNote. It’s an app for pulling together text, video, audio, and other visual resources to create shareable notebooks full of useful information. With this article, you can master OneNote in no time at all. OneNote is a digital notebook Despite the visual similarities, the thing that sets OneNote apart from Word is the way it stores and displays saved information. In OneNote, one window displays all your Notebooks, which can contain several pages and separate documents. To create a Notebook, click…

Read more

New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers. Quick facts According to a threat intelligence report, the email-based ransomware attacks started on August 9 and were detected through 62,000 phishing emails in 133 countries in just three days. It also revealed that 11,625 IP addresses were used to carry out the attacks, with the IP range owners…

Read more

Spyware has been infecting Macs for years

While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the malware gets into Mac computers. Here’s everything we know so far. Fruitfly spyware The spyware, known as Fruitfly, was first discovered in January 2017, but Synack chief security expert, Patrick Wardle, discovered a more cunning variant last month. Along with being able to track the victims’ names and locations, the…

Read more