Blog

July 19th, 2016

2016July19_AndroidPhone_CThere was once a time when a broken laptop meant your life was flipped upside down. That’s not the case anymore as long as you have an Android device with you. Everyone knows that you can check emails, edit documents stored in the cloud, and make video calls as well. What few seem to realize is that you can also print from your Android too. If that’s what you’re looking to do, here are four options to choose from.

Google Cloud Print

The wonder that is Google Cloud Print allows you to send documents and files from your device to your printer without you being on the same network. To utilize this, make your printer available to Google Cloud Printing by activating it in the Chrome browser settings of the computer it’s attached to. Then, just by connecting your printer and mobile to the same Google account, you can print any document or photo by tapping the share button on your phone or tablet, and choosing Google Cloud Print.

Prynt

If your SMB has any photography needs, this option might be the way to go. Prynt comes in the form of an instant photo printer that connects to your Android device’s charging port. Simply place your smartphone in the Prynt case, snap a picture, order Print, and that’s it. If you feel the need to spruce up your prints, the printer’s native app includes frames, filters, stickers and the addition of text before printing.

Manufacturer apps

Most popular printer manufacturers have their own apps that make printing from an Android device possible. HP has HP ePrint, Samsung comes with its Samsung Mobile Print, and Epson has Epson iPrint. Make sure to check the Google Play store to see if your printer has an app companion before trying any of the third-party options listed below.

Third party apps

Although it’s not our favorite option, there are third party apps that make it possible to send items from your Android device to your printer. Some apps -- like PrinterShare and PrintHand Mobile Print -- restrict mobile printing to Bluetooth or local wifi networks. Others -- like Cloud Print Plus -- untether local requirements so you can print from anywhere. However, it’s always better to try apps owned by hardware manufacturers and Google first. These third party apps should be considered a last resort when other options aren’t available.

Aside from printing wirelessly, Android devices can do just about anything a desktop computer can. If you’re looking for more tips and in-depth guidance on how Android can improve productivity at your business, get in touch with one of our Android experts today. We’re here to help you achieve your mobile technology business goals.

Published with permission from TechAdvisory.org. Source.

Topic android
July 18th, 2016

2016July18_MicrosoftWindowsNewsAndTips_CThe difference between regular users and power users is their proficiency in navigating the OS and utilizing its tips and tricks for an efficient computing experience. It may take anywhere from a few sessions to a few months to really get into the swing of it. Achieve power user status in a jiffy with the help of these seven tips:

Master virtual desktops

Virtual desktops allow for better utilization of screen space. You can span your applications and windows across multiple “virtual” desktops. Create one by clicking on the “Task View” icon (located at the right of the Cortana bar) on the taskbar, then click “+ New Desktop” in the lower right corner and add as many desktops as you wish. To move an application to a new desktop, merely drag it into the virtual desktop on the bottom.

Next-level screenshotting

The original screenshotting methods on Windows include Windows + Prt Scn, which captures the screen and saves it into the Screenshots folder; and Alt + Prt Scn, which captures the screen and copies it to your clipboard.

Introducing the new built-in Snipping Tool. On top of capturing a full screen screenshot, other capturing options range from a free-form rectangle to a specific aspect ratio or even an entire window as well. You can also set the capture to delay a screenshot by a set interval -- this comes in handy when you want to screenshot a YouTube video minus the playback controls.

Shake and minimize

For users who aren’t aware of this trick, you can grab a window by its bar and literally shake your mouse. This causes all the other windows to automatically minimize.

Professional Windows snapping

Snapping windows to certain parts of the screen is ideal for multitasking. You can now organize and monitor different applications more seamlessly. Make the most of your screen space with the following tips:

Drag a window to the right or left to split it in half. Drag a window to a corner to reduce it to a fourth of its size. Drag a window to the top to maximize its size.

Record your screen with the Xbox app

After launching the Xbox app, go to the app you wish to record and press Windows + G. You’ll be prompted with a window that asks: “Do you want to open the Game bar?” Click on the “Yes, this is a game” box and let the recording begin!

Talk to Cortana like a person

Aside from typing your requests, you can also use natural language to ask Cortana to locate your vacation photos, or provide directions to your friend’s house. No date needed, just specific words and she’s all set. Cortana is also synced with your calendar, so if you’re ever unsure when your meetings are, Cortana will gladly double-check.

Automatic Battery Saver mode

When activating battery saver in Windows 10, you can limit your portable devices’ background activity and push notifications to prolong battery life. Battery saver also kicks in automatically once your battery life is lower than 20%. To customize your own power threshold as well as which applications you allow to run in the background, go to Settings > System > Battery saver -- voilà!

Make the most of Windows 10 with these tips and upgrade your user status from regular to power. Regardless of what you're using it for -- arranging your meetings or planning your vacation -- make each computing experience a memorable one. Want to hear more of the latest Windows 10 news and updates? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Windows
July 15th, 2016

2016July15_HealthcareArticles_CCorporate giants like Microsoft, Google and Apple are essentially cultural icons because their software and hardware innovations have been, dare we say, revolutionary. Similarly, in the not-too-distant future, we’ll be looking back and marvelling about how healthcare once existed without some of the radical-sounding technologies that are tantalizingly close to becoming reality.

Technology companies are transforming the healthcare industry perhaps more remarkably than any other industry. Everything from miniaturized pacemakers and mobile stroke units to wearable wellness apps and bed sore-preventing electronic underwear are leading the way to a seemingly sci-fi future in medicine.

And we’re on the cusp of several other game-changing innovations that clearly qualify as “disruptive technology.” They’re things that are likely to derail the healthcare industry’s apple cart, as it were, by introducing completely new ways of diagnosing patients, conducting clinical trials, treating illnesses, and much more.

For medical industry stakeholders, the first step toward embracing these changes is awareness.

The “internet of things”

The “internet of things” literally means that “things” will be connected to the internet. People, cars, buildings, household objects, etc. will all be fitted with sensors and network connectivity that will allow them to send and receive data over the internet.

The implication for healthcare providers is all about data capture and analysis, as this kind of technology will allow physicians to have access to patients’ vital signs on-demand: blood pressure, body temperature, glucose levels, and respiratory rate will be read, analyzed, and recorded, all while patients remain in the comfort of their home. How would you adapt to this kind of patient monitoring scheme if it were to go mainstream?

Machine learning and artificial intelligence (AI)

Computers are programmed to do everything from making coffee to flying planes, and they’re even programmed to learn, as chess master Gary Kasparov knows all too well from having faced Deep Blue in their famous match.

But can corralling “big data” - which in this case amounts to roughly a trillion gigabytes of patients’ health information culled from EHRs, laboratory tests, and the like - lead to machines actually being able to diagnose and treat patients better than highly-trained human doctors?

Many in the industry are betting that it can, and AI start-ups in healthcare have raised more than $870M since 2011. Are there opportunities here for your business?

A virtual healthcare reality

By simply donning a special hi-tech virtual reality headset, a user can be “tricked” into thinking they’re in an environment that they’re not. And the technology is already being used to treat autism and PTSD, as well as conduct training in emergency response and patient diagnosis.

But it’s the future possibilities that defy belief: imagine an American doctor being “transported” via VR to a rural clinic in Afghanistan to interact with patients, participate in evaluating them, and even perform their surgeries.

Now try to imagine a patient “virtually” visiting your hospital to meet with your “machine” doctor, who will then read vital signs from nano devices inside the virtual patient’s body, over the internet, in order to schedule their robotic artificial retina surgery?

This sort of scenario isn’t actually as far-fetched as it may sound, and it may not even be that far off, either. So now might not be a bad time to evaluate how these futuristic-sounding advances - these disruptive technologies - might impact your future.

A quick call to a technical expert is one way to get answers… So contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Healthcare
July 14th, 2016

2016July14_Security_CLet’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone can implement.

1. Two-Factor Authentication

Did an attacker get your password? With two-factor authentication they’ll still need your mobile device to do any damage. Here’s how it works: every time you log into a service that requires a password, the service will send a code to your mobile device for another layer of authentication. Nowadays, most internet services have this option: Google, Facebook, Twitter, Instagram, Skype, Slack, etc. Check a full list here to see if you could be using two-factor authentication on any of your online accounts.

2. Password Manager

Say goodbye to the bygone era of memorizing a long list of different passwords for the various websites and services you use. Password manager software may have been around for a long time, but it’s still a viable solution for improving your login integrity. After installing it, all you need to do is create one secure master password and let the software do the rest. It will store and encrypt all of your passwords in one place for future reference and help generate random, more secure passwords for any new logins.

3. Keep All Software Up to Date

Update all of your software and your operating system as often as possible -- it’s that simple. New versions come with better protection and fix any newly discovered loopholes. If you are too busy or can’t find the time to do it, check for an automatic update option. Any excuse for postponing updates will feel a lot less valid when it means a security breach or system crash.

4. Disable Flash Player

Adobe Flash Player may be what allows you to play Candy Crush during your work breaks, but it has boasted such a poor security record that most experts recommend that users block the plugin entirely. Most internet browsers have the option to block Flash by default, while allowing you to enable blocked content you deem acceptable by simply right-clicking and selecting Run this Plugin.

5. HTTPS Everywhere

When dealing with technology, long acronyms tend to scare off novice users before they even make it to step two. But don’t panic, there’s only one step to this trick. ‘HTTPS Everywhere’ is a browser extension that forces your browser to automatically navigate to sites using a secured encryption, if the site allows it. The thing is, a significant percentage of websites offer HTTPS connections but don’t present them as the default. When that’s the case, ‘HTTPS Everywhere’ gives your browser a gentle nudge in the right direction.

While in-depth security measures need to be implemented and managed by experts, little steps like the ones listed here can be just as important. Check back often for more helpful cybersecurity tips, but if you have more urgent security needs for yourself and your business, our experts are ready and waiting to offer a helping hand -- why not reach out to us today?

Published with permission from TechAdvisory.org. Source.

Topic Security
July 13th, 2016

2016July13_iPhone_C2016 seems to be the year of ‘ten’s for operating systems. The world’s two largest software developers are in the tenth iterations of their platforms, and both are making big splashes in the tech world. Apple presented iOS 10 with all of its new and upgraded features last month, and we’ve seen what the beta looks like first hand. Here are six of the most impressive updates.

New lock screen

Changes to any mobile operating system (OS) almost always include updates to the lockscreen. However, this is no ordinary update. For the first time since the iPhone’s release in 2007, there’s no ‘Slide to Unlock’ feature. Instead, the screen provides in-depth, 3D touch-activated notifications displaying more detail than before without having to unlock your phone. The iPhone will automatically display the lock screen any time you pick it up, and you can unlock it by pressing the ‘Home’ button.

New widgets

Another upgrade visible on the lockscreen and homescreen is the long-awaited addition of ‘widgets.’ These are basically compartmentalized apps that run on a portion of your screen without having to open the app entirely. With iOS still in beta, the list of available widgets is already quite long, but iTunes controls, weather and calendar are a few of the standout native widgets. Don’t worry though, Apple is allowing third party widgets from the likes of ESPN, Google Maps and Amazon. They can be accessed by swiping from left to right on your lock screen or page one of your home screen.

3D touch on control center shortcuts

The iPhone 6s has been out long enough that most people have had a chance to interact with its 3D Touch feature, which performs different actions based on how much force you apply when tapping the screen. When combining 3D Touch functionality with the ‘Control Center’ dock that appears with a flick of the finger from the bottom of the screen upwards, each function displays ‘Favorite’ actions. For example, if you use a slightly more forceful touch on the Camera shortcut, you’re presented with the options to jump straight to Traditional, Slow Motion, Video or Selfie recording.

New/rich notifications

We see a lot more of 3D Touch throughout iOS 10, and another place it’s quite evident is notifications. Whether it’s on the lock screen or the notification center, a strong 3D Touch will open a small window that allows you to interact with that app without opening it completely. This is especially helpful for replying to messages and emails. In addition to this-- something that may seem small to some, but huge to others, is the ability to hide all your notifications with just two taps. Simply press hard on the ‘X’ button in the upper right, and then click ‘Clear All Notifications.’

Handwritten messages

The iPhone’s native Messages app got a thorough overhaul, but we’ll leave the discovery of emojis, invisible ink and ‘fireworks’ for another time. Those don’t have much place in the business world, but handwritten messages certainly do. Give your professional messages a more personal, attentive touch by writing responses with your fingers with the app’s Digital Touch option.

‘Delete’ stock apps

Unfortunately, you can’t get back valuable storage space by deleting unnecessary native apps. But you can finally remove them from your home screen. Don’t have an iWatch and don’t see why you need to have the app on your phone, albeit tucked away in a folder on page three? Press and hold on the app, tap the shaking X, and tap ‘Remove.’ All gone. iOS 10 is one of the most significant updates the iPhone has ever received. It’s still another month away from widespread release, but if you’d like to install the beta now, or you just want to learn more about how to automatically convert text to emojis, we’re your guys. Open up your boring, old Messages, and drop us a line. We’ll have you sending handwritten messages in no time.
Published with permission from TechAdvisory.org. Source.

Topic Apple
July 12th, 2016

2016July12_Hardware_CRemember in movies, how the villain’s lair is home to an abundance of newfangled tech, gadgets and monitors that stretch as far as the eye could see? Some may attribute it to superb set design but the message behind this was that the road to success (or blowing up your enemies) calls for not one but two monitors. If total world domination doesn’t sound enticing to you, here are six more reasons why you should work with dual monitors:

Enhanced productivity

Published studies conclude that by working with dual monitors, overall productivity increases by 20-50%. Computer programmers, for example, can use one screen for source coding and the other for programming; by using dual monitors, they no longer need to toggle back and forth between tabs. This reduces error and frees up time to complete more projects.

Better multitasking

Efficient multitasking requires adequate screen space to keep multiple applications simultaneously visible -- a view that single monitors alone simply cannot accommodate. Workers who require computers, like customer service reps and web designers, would no longer waste time switching between tabs and resizing windows to fit the limited space; they could now focus on completing their tasks accurately and efficiently. .

Easier cutting and pasting

This reason resonates with jobs that call for creating newsletters or PowerPoint presentations. Dual monitors would eliminate the need for alternating between tabs and scrolling up and down as you work. Also, the enhanced visibility reduces chances of making mistakes and thus losing more time fixing them.

Image and video editing

With dual monitors, the days of stacking numerous editing tools on top of the image or video you're working on are long gone. Instead of your screen looking like a game of Mahjong, you can put the editing tools on one screen and leave the image on the other. With better visibility, you’re less likely to commit errors and more likely to be finessed, and you’re not sacrificing valuable working time in the process.

Product comparison

You want to buy a camera, and you have two models in mind. It’s time to make a decision, so you have to compare their specs. If you had only one monitor, you’d need to go back and forth from one tab to another. But if you had two monitors, you could view the models side-by-side to help you clearly see their differences and make an informed purchase.

New gaming experience

Working hard means you get to play hard -- what’s better than a gaming session? The answer is a relaxing gaming session on dual monitors! With more screen space, you can see enemies from afar, anticipate their actions, plan your retaliation, and attack!

Dual monitors benefits almost every industry because of the enhanced visibility, larger screen space, and how you can briefly nap behind them without getting caught Using dual monitors can enhance even your leisure time activities as well.

Broaden your horizons by getting in touch with us. We’ll answer any questions you have.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
July 11th, 2016

2016July11_SocialMedia_CWhen it comes to technology news, breakthroughs, innovations, and what-to-do’s, we’ve always got our eyes peeled for the latest and greatest. Paying close attention to what’s trending is critical not only to our success, but to that of our clients as well, which is why we’re taking a look at 5 popular SEO and Social Media tactics happening now.

Everyone knows about death and taxes, the two most famous certainties that we must endure. If there were a third, surely it would be that without robust up-to-date search engine optimization (SEO) and social media strategies, your business will fall behind.

And since there’s no time like the present, we’d like to put forth some of the things that your business should consider taking into account this year in order to increase awareness of your brand, drive more traffic to your websites, and ultimately boost conversion rates.

1. Conversational search

With the success of digital assistants like Apple’s Siri, and the relatively recent roll outs of Amazon Echo and Google Home - two virtual helpers for the home - voice recognition is becoming much more prominent. For businesses, this means adapting your site’s content so it’s detectable by spoken phrase searches in addition to simple short keyword searches.

2. Social publishing

There’s tons of content published on social media, but what’s changing is the convenience with which it can be consumed. Users are ever more at ease with the videos and full-length articles dropping into their feeds - and with not having to leave the comfort of their favorite social apps to see them. The new challenge for companies will therefore be to publish high-quality content through social channels first.

3. Real-time customer interaction

Having interesting videos on your social media channels is practically old hat. Nowadays, given our speedy and seemingly omnipresent internet connections and our on-demand expectations, the move is towards live, streaming, “in-the-moment” interplay with customers, which has been shown to capture users’ attention for longer periods of time than recorded video content.

4. Increasing emphasis on apps

Mobile users spend nearly 90% of their time in mobile apps and just 10% on mobile websites. It’s not surprising given their relative ease of use, and this disparity could become even greater as social media platforms continue favoring apps and search engines like Google continue developing a “web of apps” - something that just might mean the end of traditional websites in the mobile environment.

5. More rich answers

“Rich answers” are Google’s attempt to provide search results that are sufficient enough to eliminate the need to click through to a website for more information. Their prevalence is on the rise, which could significantly reduce the amount of visits to your site. But it does provide an opportunity to use “structured markup,” a protocol that allows search engines to display your site’s data in more creative ways.

As always, the fast-moving advance of ways to optimize your internet presence is keeping us on our toes, and these 5 trends will likely make a difference for you in 2016 and beyond.

So if you sense a need to enhance your company’s SEO and Social Media strategies - but you’re not entirely sure about what to do first or how to do it - remember what Benjamin Franklin once said: “An investment in knowledge pays the best interest.”

We’ve got the knowledge, call us today and start collecting on those dividends right away.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 7th, 2016

2016July7_Web_CMost people will tell you that clouds can be only be found in the sky. But in the IT world, clouds are more grounded: the latest of which are a combination of private clouds and public clouds, appropriately dubbed “hybrid clouds.” This innovation allows SMBs to have the best of both cloud worlds while minimizing IT expenses, optimizing scalability, and improving security.

Hybrid clouds, as the name suggests, are a version of cloud computing that are made up of two different components. They are a combination of private clouds (where data and applications that require tighter controls are hosted either internally or privately in the cloud space); and public clouds (which are operated externally by third-party providers with the express purpose of reducing a company’s IT infrastructure).

A recent “State of the Cloud” report indicates that 71% of all cloud users are now implementing hybrid cloud solutions, mainly because the ways in which they benefit small- and medium-sized businesses are so numerous. Here we’ve highlighted what we consider to be the 4 most significant benefits of hybrid cloud solutions.

Cost efficiency

Does your industry go through seasonal workload increases? With a hybrid cloud solution, you’ll be able to easily handle spikes in demand by migrating data from maxed-out on-premise servers to scalable, pay-as-you-go “servers in the sky” whenever needed, without incurring any extra hardware and maintenance costs.

Adaptability

Having the ability to choose between on-site/privately-hosted cloud servers and ones on the public cloud gives you more than just cost flexibility. It also gives you the capacity to pair the right IT solution with the right job, like keeping smaller projects on your local or private cloud, while utilizing the more robust computing resources on offer from the public cloud for your bigger projects.

Scalability

What exactly does this common IT buzzword mean for your organization? In a nutshell, it means that the hybrid cloud allows you to “scale up” or “scale down” on an as-needed basis. So if there are last-minute demand increases that your hardware can’t support, or if you’re simply planning for future expansion, hybrid cloud solutions allow for on-demand increases or decreases in capacity.

Security

Last, but certainly not least, are the security advantages of a hybrid cloud solution. SMBs are able to host within the private cloud their more sensitive data such as an e-commerce website or HR platform, while using the public cloud space for less sensitive data where it’s more cost effective and there is less likely to be major problems should there ever be a security breach.

SMBs can set up their hybrid cloud model in a few different ways, depending on their precise needs and the types of providers available to them:

  1. By employing one specialized cloud provider who offers soup-to-nuts hybrid solutions
  2. By integrating the services of a private cloud provider with those of a public cloud provider themselves
  3. By hosting a private cloud themselves and then adopting a public cloud service which is incorporated into their infrastructure
So as more of our customers' IT infrastructure moves to the cloud, we’re adapting and developing innovative ways to maintain hybrid cloud environments. What this means for you is we’ve got the know-how to provide outright cloud solutions, or at the very least the expert consultation you need, to ensure that your day-to-day operations transition to a hybrid cloud solution without interruption and in a cost-effective manner. Contact us today to learn more about the benefits that the hybrid cloud can bring to your business.
Published with permission from TechAdvisory.org. Source.

Topic Web & Cloud
July 5th, 2016

Security_2016_July_5_CWordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable platform out there. Recently WordPress has released an update that addresses security issues for all previous versions. Check out exactly what the update entails.

What’s new in WordPress 4.5.3?

The latest WordPress version includes fixes for more than two dozen critical vulnerabilities, including:
  • Redirect bypass in the WordPress customizer API
  • Two separate cross-scripting problems via attachment names
  • Information disclosure bug in revision history
  • Denial-of-service vulnerability in the oEmbed protocol
  • Unauthorized category removal from a post
  • Password change by stolen cookies
  • Some less secure sanitize_file_name edge cases
All vulnerabilities were found by members of the WordPress community. In addition to the security issues listed above, WordPress 4.5.3 fixes 17 maintenance issues from its predecessors 4.5, 4.5.1 and 4.5.2 (See full list).

WordPress update process

Many sites have an automatic background update, meaning that website admins will receive an email, confirming the update. If your website doesn’t support this feature, you can trigger manual updates by logging in to your WordPress dashboard and click on the ‘Please update now’ link, which is clearly visible on the top of the page.

Before you perform the update, however, we highly advise you to make a backup of your website. This is so that you can quickly restore your site in the event that something goes wrong. Once you have your backup ready, you can go ahead and update your site with the push of a button. Alternatively you can download WordPress 4.5.3 here and install it via File Transfer Protocol (FTP).

It’s important to update to the newest versions of WordPress to ensure that you have access to all of its functionalities and to keep your data and website visitors safe from potential security threats. Google will also demote websites that are running old versions of WordPress in its search results pages - all the more reason why you should regularly check for WordPress updates. If you have any questions about WordPress security, feel free to get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 4th, 2016

Security_Aug31_CThe Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad - some utilize their skills in committing cyber crimes from the comfort of their own homes. Case in point, the recent Cerber ransomware attacked that ravaged millions of Microsoft Office 365 users worldwide. Here’s what a security expert and Microsoft had to say about the matter:

Steven Toole, a researcher for the cloud-security firm Avanan, detailed that his company experienced the first attack at 6:44 a.m. on June 22nd. Another interesting fact is that at least 57 percent of all Microsoft Office 365 customers on Avanan’s platform received at least one phishing attempt that contained the infected attachment. While Avanan did extrapolate the number of Office 365 users involved, the exact number has yet to be revealed.

This is particularly interesting since according to Microsoft’s first quarter reports in 2016, there are over 18.2 million Office 365 subscribers worldwide. On top of the global scale in which the attacks took place, it took Microsoft over 24 hours for the attack to be detected and for any attempts to block the attachment to be made.

Microsoft’s side of the story shares many similarities with slight differences on the detection and actions made about the ransomware attack. In an email to SCMagazine.com, the spokesperson wrote:

"Office 365 malware protection identified the attack and was updated to block it within hours of its origination on June 22. Our investigations have found that this attack is not specific to Office 365 and only a small percentage of Office 365 customers were targeted, all of which have been protected."

The point is Office 365 was compromised, regardless of how quickly it was detected - many people were asked for a ransom and were told that their files have already been encrypted. Still wanting to come across as polite, the ransom came with an audio recording that detailed what the attack was and what measures must be taken in order to regain access to the files. The unknown attacker asked for a ransom of 1.4 bitcoins or an equivalent of $500 in exchange for the decryption key.

Toole noted that “This attack seems to be a variation of a virus originally detected on network mail servers back in early March of this year," He also added that "As it respawned into a second life, this time Cerber was widely distributed after its originator was apparently able to easily confirm that the virus was able to bypass the Office 365 built-in security tools through a private Office 365 mail account.”

This proves that cyber criminals go to great lengths to not only use their tools but to improve on them and eliminate flaws. So no matter how many firewalls, passwords or fire-breathing dragons you have to guard your servers and networks, without the right network security measures in place, chances are they’ll manage to find a way to overcome the hurdles and wreak whatever havoc they can.

Network security isn’t something to be taken lightly, if you are unsure about how safe or how capable your systems are in fending off cyber threats - get in touch with us. Our experienced and friendly staff will help you with any ransomware or security-related issue you have.

Published with permission from TechAdvisory.org. Source.

Topic Office