Beware of a new Locky-type ransomware

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.

What is Amazon AppStream 2.0?

What is Amazon AppStream 2.0?

Managing applications on-premise is expensive and inefficient. Today’s workforce is now more mobile than ever before, which is why businesses are investing in remote access solutions so their employees can access applications and documents whenever and wherever.

Move over IE, Hello Microsoft Edge!

Move over IE, Hello Microsoft Edge!

Not all Windows users are fans of Internet Explorer, and not all Mac users are crazy about Safari. But there’s good news for Windows users: Windows 10 replaces IE with a brand new browser, Microsoft Edge. Here is a list of the key features you shouldn’t miss out on:

Import favorites
You can easily import the list of websites you’ve marked as favorites from any web browser to Microsoft Edge.

Azure is getting a new type of container

Azure is getting a new type of container

Virtualization has moved out of the server farms owned by big-name enterprises and onto the wishlists of small- and medium-sized business owners. As a subset of virtualization, container technology is benefitting from this commercialization and becoming more accessible to everyone.

Grow your business with new Office 365 apps

Grow your business with new Office 365 apps

Microsoft never fails to announce exciting new features for their products. In an effort to improve support for small- and medium-sized businesses, they introduced a series of new apps and enhancements for Office 365 during the Inspire conference in July.

Are all hackers out to do harm? Not so fast

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day.

Stop using Google’s SMS sign-in

Stop using Google’s SMS sign-in

To ensure optimal security, two-step authentication is used. This requires a password as well as a unique six-digit code that is typically sent via SMS. The National Institute of Standards and Technology has voiced its concerns about this method and Google quickly responded by having users try an alternative method.

6 CRM best practices you need to know

6 CRM best practices you need to know

Most companies have customer relationship management (CRM) software to help them keep track of contact information and purchase history. But having a large database is worthless if you’re not using it to build long-lasting relationships. To keep existing clients coming back and bring new ones in, follow these CRM best practices.

Google’s cloud platform receives an upgrade

Google’s cloud platform receives an upgrade

As more and more businesses move their IT resources into the cloud, it’s no wonder that a company as big as Google is doing everything it can to upgrade the products it delivers over the internet. The search giant has at least 60 separate cloud services, and its most recent release makes them all faster.