it

Firewalls: hardware vs. software

Most people have a vague idea of what a network firewall does. But some business owners are easily fooled by…

7 years ago

Is WebRTC a worthwhile addition for you?

The VoIP industry is becoming increasingly hard to define. More and more are voice communications being made over internet connections,…

7 years ago

Cloud computing for the healthcare industry

No healthcare provider today can operate without robust technology backing them. That doesn’t mean they have to spend excessively on…

7 years ago

Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless”…

7 years ago

New Mac malware linked to DNC hacking group

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year.…

7 years ago

Introducing Cloud Search for G Suite users

Google Cloud Search is the latest tool launched for business customers that allow users to search across their G Suite…

7 years ago

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content…

7 years ago

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of…

7 years ago

How to get a sneak preview of Instant Apps

At its I/O 2016 conference, Google introduced us to Android Instant Apps. This built-in feature allows users to access a…

7 years ago

Why you should be an Office Insider

To deliver unparalleled service, Microsoft tests products and features months before they’re released to the public. One of the ways…

7 years ago

This website uses cookies.