Blog

Selecting the perfect Office 365 plan

Office 365 Business, Business Premium, Enterprise E1, E3, and E5. Each of these Office 365 plans offer different features and services. Implement the wrong one, and you may end up with a solution that doesn’t fully meet your company’s needs. To help your business select the right Office 365 license, we’ve summarized and listed the […]

US election hackers develop new Mac malware

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the Mac malware does and how your business can defend against it.

Is Your Disaster Recovery Plan Up to Par?

No matter how much we analyze your network activity, or how many cybersecurity conferences we attend, nothing educates us like the missteps of real-world businesses. Learning from example is by far the best way to beef up your disaster recovery plans (DRPs), and the recent audit of a state government office gifted us plenty of […]

Vulnerabilities in popular printers

What harm could possibly come from printing a document? According to some researchers who performed a large-scale analysis of printer attacks, a lot. These could be in the form of Distributed Denial-of-Service (DDoS) attacks, which are as devious as they sound, or attacks made through extracted print jobs.

How can you go from reactive to preventive IT?

If your business hasn’t taken cybersecurity seriously yet, it’s certainly time. These days, if you’re not actively preventing cyber-attacks, you’ll eventually be spending a lot of time and money reacting to them. Whether you’re working with in-house IT staff or an outsourced provider, it’s extremely important that proactive cybersecurity measures are taken to secure your […]