Blog

You can now speak with Alexa via Android

Your cousin got Alexa. Your neighbor got Alexa. Heck, even grandma got Alexa. You may not have been one of the lucky souls to receive an Alexa-enabled device last Christmas, but fret not, the latest update of the app on Android now enables voice control.

Groups, Yammer, and Teams defined

While most Office 365 apps serve a unique purpose, tools like Outlook Groups, Yammer, and Microsoft Teams can all be used to communicate and collaborate with coworkers. However, there are subtle differences in the way they can be used, and today we’ll break it down for you.

Windows releases a new patch for PC users

Two vulnerabilities, known as Meltdown and Spectre, have been found affecting almost every Windows desktop and server. Computers affected by these two vulnerabilities are susceptible to having their data stolen, such as personal photos and passwords.

Enlist IT help when installing CPU updates

When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released.

Spectre & Meltdown safety for Apple devices

January 23rd, 2018 Apple

Undoubtedly, 2018’s first set of truly bad news involves reports about the Spectre and Meltdown bugs, fundamental flaws in computer processors that can leak highly sensitive data. Researchers say they affect a majority of modern computers, and chances are your business’s devices are also affected.

3 simple and easy cyber-security tips!

Data security and privacy should be a top priority in this age of constant and downright dangerous cyber attacks. However, in your quest for ultimate security, don’t forget to implement these non-technical steps to shield your business’s IT resources.

Critical browser vulnerabilities discovered

According to security researchers, a bulk of the world’s computer processors have gaping flaws. The flaws, grouped under the term ‘Spectre,’ affect many critical systems including web browsers like Chrome, Safari, Microsoft Edge, and Firefox. Here’s a quick rundown of these major vulnerabilities and what you can do to secure them.

Should you use UPS for your network gear?

Smart business owners use uninterruptible power supply (UPS) for emergency situations like a storm, fire, or other disasters. Often, a UPS is deployed for desktop computers to give employees ample time to save their work and prevent losing unsaved work.

Backup Android Files to PC or Mac

From important work contacts to your favorite holiday photos in Cabo, it’s hard to imagine losing files on your Android phone. In the event of your device getting stolen, lost, or damaged, it’s better to be prepared and make sure that your most precious data is backed up.

When Pre-installed Apps Create Risks

Bloatware is generally considered harmless, but what about when these unnecessary apps turn into a security risk? A recent report shows that a pre-installed app in some versions of Windows 10 had an alarming plugin flaw:

Tavis Ormandy, a researcher from Google's Project Zero, recently discovered that a compromised password management app, Keeper, had been installed with some versions of Windows 10. For a brief period, Keeper's browser extension, when enabled, allowed websites to easily steal login credentials.