Need business management software? Try ERP

September 28th, 2017
Need business management software? Try ERP

Whether you run a startup or a well-established corporation, there are always ways to improve how the business is managed. For some, introducing new corporate policies can streamline business processes, but if you want to see significant improvement, consider enterprise resource planning (ERP) software.

Microsoft launches My Workspace for macOS

September 20th, 2017
Microsoft launches My Workspace for macOS

If you’re using Office 365 on a Mac computer, here’s some good news: Microsoft has introduced a new tool that will help you manage your Office 365 apps much more easily. My Workspace is a productivity-enhancing application that offers quick access to frequently used apps and files.

New phishing scam targets Office 365 users

September 15th, 2017
New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that’s even more difficult to identify.

Is your business ready for hurricane season?

September 13th, 2017
Is your business ready for hurricane season?

In late August 2017, Hurricane Harvey caused widespread power outages and floods across Texas and certain parts of Louisiana. Weeks later, Hurricane Irma hit the coast, affecting Florida, Georgia, and South Carolina businesses. Now, experts are saying there are more storms to come, which is why you need a good disaster recovery (DR) plan that has you prepared for the worst.

Facebook faces devious adware

September 11th, 2017
Facebook faces devious adware

When you receive an email from an unfamiliar source urging you to click on a link or download a file, it’s easy to send it straight to the bin due to its spam-like nature. It’s a completely different story when the message is sent via Facebook Messenger by one of your friends.

OneNote: the hidden gem in Microsoft Office

September 1st, 2017
OneNote: the hidden gem in Microsoft Office

Almost everyone loves PowerPoint, Excel and Word, but there’s another Office application that should be recognized as a must-have: OneNote. It’s an app for pulling together text, video, audio, and other visual resources to create shareable notebooks full of useful information.

New Locky ransomware: what you need to know

August 30th, 2017
New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.

How Amazon AppStream 2.0 can help businesses

August 28th, 2017
How Amazon AppStream 2.0 can help businesses

Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service.

Office 365 gets a slew of new upgrades

August 18th, 2017
Office 365 gets a slew of new upgrades

There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses.

Black and white: Not all hackers are bad

August 16th, 2017
Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.