How to secure your IoT devices

More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at bay, we advise you take the following precautions with your IoT devices. Set passwords Many often forget they can set passwords for IoT devices. When this happens, they tend to leave their gadgets with default passwords, essentially leaving the door open for hackers. Make sure to set new and strong…

Read more

CopyCat on the prowl for Android

New strains of malware are being developed every day. In fact, the number was nearly one million per day in 2015. With so many in existence, some have gone under the radar, as such is the case with CopyCat. So if you’re using any type of Android device, know that CopyCat likes to use its claws. What is it? CopyCat is a strain of malware that pretends to be a popular app on third-party app stores. Alarmingly, it has already infected more than 14 million Android devices around the world, with the majority of victims in Asia. However, users in…

Read more

Amazon releases high-end virtual desktops

It’s nearly impossible to discuss virtualization without bringing up Amazon Web Services (AWS). It was one of the first big names in user-friendly virtualization services and it’s only gotten better over the years. With its latest release, AWS is providing customers with some serious computing power. What are AWS virtual desktops? If you have employees who need occasional access to lightning-fast workstations, hardware costs add up quickly. One way to tackle this problem is by providing users with low-end hardware that connects to a cloud service provider that delivers virtual desktops. These full-fledged desktops can be accessed over the internet…

Read more

New Microsoft Workplace Analytics

Workplace Analytics is a program that helps managers determine staff productivity levels using data gathered from their email, calendar, documents, and other applications within Office 365. Previously, Microsoft’s MyAnalytics allowed only employees to view their individual data, but with this updated version, managers now have access to this data, too. How it works Now available as an add-on to Office 365 enterprise plans, Workplace Analytics extracts behavioral insights from data gathered from Office 365 email, calendar, documents, and Skype. This means that any data an employee types into their email and calendar — whether it’s on the subject line or…

Read more

Why Nyetya is more threatening than WannaCry

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers believe it to be stealthier and more sophisticated than WannaCry. Worse than WannaCry Nyetya is deemed worse than WannaCry mainly because it spreads laterally, meaning it targets computers within networks and affects even systems that have been patched. Because it also spreads internally, it needs…

Read more

macOS High Sierra’s new features

High Sierra — Mac’s first full OS upgrade since Snow Leopard in 2009 — has finally been released as public beta. But users who expect shiny new features might feel slightly disappointed as the new OS’ most useful updates are actually under the hood. To that end, let’s take a look at what’s new in macOS High Sierra. Photos Photos gets the most visual upgrade designed to improve user experience especially for those with numerous pictures to browse through. The toolbar has been revamped and is now customizable, allowing you to re-order sections. Media is now organized by content type,…

Read more

Automate mundane emails to get more done

Everyone wishes there were more minutes in a day. Between repetitive emails and seemingly endless meetings, it’s hard to find time for important tasks. Thanks to the increasing affordability of enterprise-level IT however, SMBs can start getting at least half of those problems under control with email automation. What is email automation? Usually included in customer relationship management (CRM) software, email automation centers around the idea of combining your business data into emails to customers and prospects. This allows you to draft templates with placeholders for names, addresses, and other variables that the platform will match with individuals from your…

Read more

Ad blocker is coming to Chrome

Pop-up ads and videos can easily turn people away from a website. Google knows this and has come up with a solution set to launch early next year. With that in mind, here’s everything you need to know about Chrome’s ad blocker. What is it? Ad blocker from Chrome actually works like an ad filter, meaning it won’t block all ads from the website, only ones that are determined to be too intrusive, like video autoplay with sound as well as interstitials that take up the entire screen. A group called the Coalition for Better Ads, which consists of Google,…

Read more

How thin and zero clients save money

Businesses are always looking for ways to cut costs without sacrificing growth. For the longest time, many believed that they had to purchase workstations with its own processing power, RAM, and hard drive. But thanks to virtualization, companies can save money and get the computing processes they need with thin and zero clients. What are thin and zero clients? Thin clients are stripped-down computers with minimum processing power and memory. They rely on a basic operating system and a network connection to access a more powerful system where almost all computing processes take place. Zero clients work the same way.…

Read more

The benefits of virtualization in 2017

The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require individual attention. Virtualization makes this relationship far more flexible, and we’ve got a rundown on a few of the best examples. More technology uptime Virtualization vendors use lots of fancy names for the features of their technology, but behind all the technobabble are a number of revolutionary concepts. Take “fault tolerance” for example. When you use virtualization to pool multiple servers in such a way that they can be used as a single supercomputer, you can drastically increase uptime.…

Read more