Blog

8 hidden upgraded Firefox functions

8 hidden upgraded Firefox functions

Bouncing back from a short hiatus, Firefox returned with a bang by snatching the PCMag Editors’ Choice award for best browser. With a plethora of upgrades coupled with its nifty new layout, Firefox was poised for victory. While all browsers share some functional similarities — security and accessibility, for example — certain characteristics and functions make each one unique.

4 Social engineering scams to watch out for

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information.

Enterprise level virtualization for clients

Enterprise level virtualization for clients

Virtualization has permanently changed the world of IT and computing and bringing with it the overhaul of IT architecture and workflow. One would think that it would reach its saturation point sooner or later but with constant innovation and development, virtualization has permeated and penetrated deep as to reach the client level.

Spoofed email takes down NBA team

Spoofed email takes down NBA team

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the Milwaukee Bucks fell victim to a spoofed email scam last month. Names, addresses, Social Security numbers, compensation information and dates of birth of the players were unknowingly sent to a hacker and created a massive security issue for the team.

Learn from this NFL team’s EMR fumble

Learn from this NFL team’s EMR fumble

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of your company.

Ransomware adopting self-replication

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection.

The future of work lies in human cloud

The future of work lies in human cloud

It’s an amazing time to start a business and take your ideas to the market more quickly, and at lower costs without the traditional barriers in hiring skilled workers. A world of talented contractors is now available in the “Human Cloud”, ready to help you do the heavy lifting of building your company.

How to manage virtualization security risks

How to manage virtualization security risks

When it comes to security, topics like the cloud and networks get wide coverage on Internet blogs and forums. However, other types of technology fly completely under the radar. Virtualization just so happens to fall into this category. And just because people aren’t talking about it doesn’t mean virtualized machines and infrastructure should be left unsecured.

Wearable tech for employees: Good or bad?

Wearable tech for employees: Good or bad?

Make no mistake, healthcare costs are rising. For business owners who are generous enough to offer their employees insurance, this is undoubtedly a cause for concern. And you may wonder, is there any way to protect your employees and not go bankrupt in the process? Wearable technologies may be the answer.