Blog

Cybersecurity Essentials: VPN

Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, a VPN is a group […]

Google improves Chrome’s security settings

Google improves Chrome’s security settings

Most web browsers have built-in security measures to protect users, but some of those aren’t enough to ward off unwanted software. To improve Chrome’s security, Google rolled out some changes in its Chrome Cleanup tool for Windows. Here’s how the enhanced tool protects you. Detect hijacked settings Many users prefer to enhance their browsing experience […]

VoIP options: Open source vs. Proprietary

November 24th, 2017 VoIP
VoIP options: Open source vs. Proprietary

Switching to internet-based phones gives you the chance to enjoy innovative new call features and significant cost reductions. There are a lot of options when choosing which voice over IP (VoIP) platform you use, but first you need to pick whether you’ll use an open-source or proprietary system. What are “proprietary” systems? When most companies […]

Outlook on Mac and Windows gets redesigned

Outlook on Mac and Windows gets redesigned

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes. How Outlook […]

Recruit talent using Google!

Recruit talent using Google!

The last thing you want when hiring new candidates is your competitors poaching them. This is why you need to post your job listings quickly on the right platform. If you’re not already doing that using Google for Jobs, here’s why you should. What is it? Google for Jobs is a search feature that sorts […]

Google studies effects of leaked logins

Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results. The results From March 2016 to March 2017, Google and UC Berkeley […]

OneDrive’s new feature helps you save space

OneDrive’s new feature helps you save space

Don’t you just hate it when your PC gives a warning message that it’s running out of space? You’re then forced to go through all your files to figure out which are important and which ones can be deleted. Sometimes you manage to get a few megabytes back, but oftentimes you end up grabbing your […]

Unified Communications Explained

November 8th, 2017 VoIP
Unified Communications Explained

There was a time when “voice” was the sole business communication solution. Then, we were introduced to emails, texts, and chats, all of which are extremely useful and are here to stay. But wouldn’t it be nice if there was a communication solution that integrated everything — voice, messaging, video — into one platform? That’s […]

Hackers exploit vulnerable Office feature

Hackers exploit vulnerable Office feature

As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen. What’s the new Office threat? […]