What are watering hole attacks?

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

New AI-driven Features For Office 365 Users

Yet again, Microsoft has released new AI-based features for Microsoft Excel, Word, Outlook, and more -- a continuing trend since 2016’s launch of the Microsoft AI and Research Group. If your business is subscribed to Office 365, this article will acquaint you with the newest features!
Automatically Uncover Trends in Excel Data
Finding useful information lurking in massive tables of jumbled numbers and data can be quite a headache.

Android Oreo: Google’s latest tasty OS update

Google’s Android updates are among the most anticipated events for smartphone users every year. Each major update promises to be slicker, faster, and more secure than the previous version, and 2017 is no different. With Android Oreo, smartphone and tablet users have a lot to be excited about.

Microsoft adds new Office 365 apps for SMBs

There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses.

Windows XP receives security update

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons.

Prevent ransomware with HIPAA compliance

Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware -- malicious software that encrypts files until the victim decides to pay the Bitcoin ransom -- took advantage of this when it hit several healthcare institutions last month.