There’s plenty to get excited about in Android 8.0: improved auto-fill functionality, picture-in-picture capability, greater notification control, and plenty more. While these features are all-impressive, Android has also included a number of significant security enhancements that you shouldn’t miss.
From cloud hacks to malicious macros, hackers are becoming more creative in how they breach Microsoft Office. And although Microsoft releases security patches as soon as vulnerabilities are discovered, there’s a new hacking technique that allows cybercriminals to slip past traditional threat detection tools.
What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same fate as Equifax, which is an interesting story we’re about to tell.
How much does your business pay for software licenses? What about the annual maintenance costs? For most SMBs, software investment has long been a significant portion of their operating costs. But with Software as a Service (SaaS), you can utilize software at a much lower cost.
A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far.
When new malware surfaces, many people often assume that it’s designed to attack Windows computers. However, Mac malware has been growing in popularity. Earlier this year, security researchers unearthed a new strain of spyware that may have been silently monitoring Mac computers for years.
Just a few years ago, smart appliances seemed like novelty products for rich business owners. Now, the Internet of Things (IoT) has become a viable solution for putting your business ahead of the curve. But whether it’s a smart fridge or a surveillance camera that connects to your phone, IoT devices should be treated and secured just like any computer in a network.
Truly understanding the ins and outs of virtualization is not for the faint hearted. It’s a complicated field that is constantly evolving, but one thing remains mostly the same: its benefits. Read on for an uncomplicated recap of just a few of virtualization’s greatest advantages.
Adding to the list of reasons to outsource your network security to a certified IT provider, a recent CIA leak shows just how vulnerable most network routers really are. Read on to learn why this is such a big vulnerability and what you can do to fix it.
Over the years phishing — a social engineering attack that uses seemingly innocuous emails to trick victims into giving away personal information or clicking a malicious link — has grown in sophistication and scale. In order to put a stop to these scams, Google has made some security enhancements for Gmail.