Blog

Blog

These Disturbing Extortion Emails Use Real Information to Trick You

Being on the receiving end of malicious emails is never fun. A new wave of extortion emails takes it to a new level, though.

We’ve seen multiple emails recently claiming to have compromising video of the receiver and demanding payment. What makes these emails especially scary is that they include the recipient’s real username and password.

Read More »

Best Programs for Managing Projects in Office 365

Using a project management application can provide significant benefits to companies looking to streamline processes in their businesses. It can greatly reduce time spent on planning as well as increase team productivity.

If you’re using Office 365, you already have access to multiple apps and platforms to help with project management. Each tool has its own strengths—it’s just a matter of what you’re trying to do.

Read More »

Four Practical Password Tips You Can Actually Follow

Change your password every 90 days. Use a different password for every account. Use a random combination of letters, numbers, and special characters. Don’t use dictionary words. Don’t write your passwords down.

You’ve probably heard all this advice before for creating passwords. You’re also probably ignoring it—realistically, it’s hard for most people to follow this advice on a day to day basis. When security and usability are at odds, most people tend to favor usability.

But productivity and security don’t always need to be at odds. Here are four password tips you can actually follow:

Read More »

What You Need to Know This National Cybersecurity Awareness Month

Like any industry, cybercrime is continually evolving. New trends emerge, and new threats pop up all the time. October is National Cybersecurity Awareness Month, making this the perfect time to review and refresh your cybersecurity knowledge.

Here are four things you need to know right now:

 

Read More »

That Mortgage Document Email May Be Phishing

Like any industry, cybercrime has fads and trends. A recent trend in phishing attacks is especially dangerous for companies in the real estate sector and anyone in the process of buying real estate: phishing emails that look like mortgage documents.

These typically look like emails about closing documents with a link to a fraudulent website intended to steal your login credentials.

Read More »

What You Need to Consider Before Implementing BYOD

 More and more businesses are switching to a bring your own device (BYOD) policy for employee computers. In theory, it sounds like a win-win. The company saves money and employees can work on machines they’re already familiar with.

In practice, it’s rarely as easy as that. If you are considering implementing BYOD, there are a few things you need to consider first. BYOD is often harder to manage from an IT standpoint and usually leads to unexpected costs.

Read More »

Four Things You Didn’t Know You Could Insert Into an Outlook Email

If you’re like most professionals, email takes up a lot of your day (probably too much of your day), and there is a good chance you’re using Outlook to do it. Outlook actually has a lot of features that can make email a little less annoying. But a lot of people don’t use these features—mostly because they don’t know about them.

Some of the most convenient features that a lot of people don’t know about are in the “Insert” tab in the email compose window. There is a lot you can quickly insert into email when you’re writing them without having to switch windows or use an outside program.

Read More »

Can you spot a phishing attack? [Quiz]

One of the biggest misconceptions we still run into with companies when it comes to cybersecurity is around phishing. A lot of people think only naive or stupid people fall for phishing attacks. That's just not true.

Cybercriminals have come a long way, and phishing attacks are harder than ever to spot. Follow the link below to test your knowledge about phishing and see if you can spot an attack.

Read More »

Save Time in Microsoft Teams with Slash Commands

Microsoft Teams is the productivity and chat app designed to help companies communicate. Like most Microsoft programs, there is a lot you can do with it and more features are constantly being added. While it’s not overly complicated, there are some nice shortcuts, called slash commands, that can save you time and make Teams just a little bit easier to use.

Slash commands are short commands, typed into the search bar at the top of Microsoft Teams, which help you quickly take an action. They all start with a “/”—hence the name slash commands.

Read More »

Five Things Every Office Manager Needs to Know About Cybersecurity

Office managers are a critical part of any business—their work literally keeps most offices running. What most people don’t realize (including many office managers themselves) is how vital they are to the cybersecurity efforts of their company.

Here are five things every office manager needs to know about cybersecurity:

Read More »
   
Ultimate Guide to Small Business Cyber Security