Router malware worse than experts realize

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter recap A team of security researchers from Cisco released a report that a strain of malware had been discovered on hundreds of thousands of routers and network devices. Originally, researchers believed it affected only Linksys, MikroTik, Netgear, and TP-Link devices. Like many malware strains, VPNFilter infects devices that use default…

Read more

What’s new at the 2018 Apple WWDC?

San Jose, California, recently hosted WWDC 2018. Apple’s engineers interacted with the developers in attendance, while everyone at the event got a sneak preview at the computer manufacturer’s upcoming products and software. Check out the highlights from the event right here! A more personal, faster iOS 12 Apple has focused on improving the operating system’s performance so that iPads and iPhones become more responsive and work faster. The good news is that older devices that can still run iOS 11 will be compatible with iOS 12. Developers tweaked the software to make apps launch quicker, especially the keyboard and camera.…

Read more

Hide & Seek: New IoT malware to watch out for

You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices. What is the Hide And Seek malware? The Hide and Seek (HNS) malware has created a “botnet” by quietly infecting thousands of devices using advanced communication methods. Without getting too technical, a botnet adds or “recruits” computers to their network to carry out malicious acts, such as overloading a network by telling every infected device in the…

Read more

The dangers of app overload in businesses

Businesses today rely on countless apps and software for day-to-day operations. However, too many of these programs can do more harm than good. App overload brings confusion among employees, and a recent study shows that this costs more than companies realize. How app confusion occurs A new study conducted by CITE Research shows that a surplus of apps is causing a great deal of confusion in the workplace. Among the 2,000 workers from the US, UK, and Australia surveyed, 69% wasted as much as 32 days a year navigating between apps — that’s an hour of productivity lost every single…

Read more

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption. And last year, Google began marking some HyperText Transfer Protocol (HTTP) pages as “not secure” to help users comprehend risks of unencrypted websites. Beginning in July 2018 with…

Read more

Battle of the mobile OS: Android vs. iOS

It normally takes you hours of watching phone reviews on YouTube to decide which model or brand to buy. And for your business, you assume that it’s pretty straightforward since your team will use it only for client communication. But with the multitude of efficient apps available for remote working nowadays, that is not the case anymore. Determine which mobile operating system (OS) is ideal for business use. Price Range Apple is a luxury brand, and the only way budget-conscious businesses can afford an iPhone is if they consider secondhand market or rely on older models. But of course, you…

Read more

Why fewer teenagers choose Facebook

Facebook’s 13-to-17-year-old users are declining despite the overall growth of the social media giant’s subscribers. A new survey by Pew Research Center found that only 51% of US teens are using Facebook, compared with Snapchat (69%), Instagram (72%), and YouTube (85%). Reasons for user demographic shift The same survey found that only 10% of US teens use Facebook most frequently, unlike other platforms like Instagram (15%), YouTube (32%), and Snapchat (35%). There are two main reasons why Facebook is no longer the first social media choice for US teenagers: visual content and control. #1. Visual Content The current youth demographic…

Read more

Virtualization isn’t as complex as you think

Explaining the concept of virtualization is no easy task, and failed attempts to do so have left it with an undeserved reputation. We want to set the record straight about this technology’s many benefits by dispelling the four most common misconceptions. Myth #1 – Virtualization is too expensive for SMBs Many people assume that the more advanced an IT solution is, the more expensive it is to install and maintain. That’s not the case for virtualization, which is a strategy to boost hardware efficiency and cut costs. Sure, a virtual server requires more support than a traditional one, but the…

Read more

Flash to be stopped in Office 365

If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of the past. Over a week ago, Microsoft announced that Office 365 would completely block said media by January 2019. Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good.…

Read more

How to defend against insider threats

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents. #1 Educate – The workforce (meaning all healthcare employees) must be educated on allowable uses and disclosures of protected health information (PHI) and the risk associated with certain behaviors, patient privacy, and data security. For example, when a celebrity is admitted to hospital, employees may be tempted, just out of curiosity, to sneak…

Read more


Important
This site makes use of cookies which may contain tracking information about visitors. By continuing to browse this site you agree to our use of cookies.