Entries by John Murray

Should employers monitor remote employees?

With remote work becoming the new normal for many businesses, employers can’t help but worry about how much work their employees are getting done. One way to determine this is by monitoring employees online. However, this practice can raise privacy concerns. This article will shed light on what employee monitoring is and how it can […]

,

FBI says business email compromise is a $43 billion scam

The Federal Bureau of Investigation (FBI) said today that the amount of money lost to business email compromise (BEC) scams continues to grow each year, with a 65% increase in the identified global exposed losses between July 2019 and December 2021. From June 2016 until July 2019, IC3 received victim complaints regarding 241,206 domestic and […]

The differences and benefits of two-factor and two-step authentication protocols

Both two-factor authentication and two-step authentication are processes that can help keep your business safe from data breaches. But while they serve the same purpose, these two methods are vastly different. In this blog post, we will discuss the differences between two-factor authentication and two-step authentication, as well as the benefits of each process. According […]

,

Microsoft Teams for dummies: A simple tutorial for beginners

This guide will take you through the essential Microsoft Teams features Following the rapid shift to remote or hybrid working, many employees were simply expected to know how to use video conferencing tools like Microsoft Teams. However, for the majority of the workforce, a day spent in the office meant little more than responding to emails. The sudden adoption of Microsoft […]

,

Is Cloud Computing Safe for Small Businesses?

You might wonder if now is the right time for your small business to turn to cloud computing for all your data storage needs. While you’ll find many benefits with cloud computing, you might also have concerns over potential security issues. Fortunately, you can embrace the advantages of cloud computing while still keeping your small […]

,

Why managed IT services is best for SMB cybersecurity

Without technology, businesses cannot compete and succeed. But with the advancement in technology comes the ever-constant threat of hackers and cybercriminals. That’s why small- and mid-sized businesses (SMBs) need to protect themselves with robust cybersecurity solutions managed by reputable managed IT services providers (MSPs). The numbers Through the years, the number of SMBs falling victim […]

,

5 Cybersecurity Tips That Small Business Owners Should Know

Small businesses aren’t exempt from Russian cyberthreats, according to US officials. Here’s what to know. In the wake of Russia’s invasion of Ukraine, cybersecurity concerns in the US are mounting for small businesses, home offices and larger enterprises, according to national security alerts issued by the FBI, DHS and CISA. Even though government-sponsored attacks are gaining public […]

,

5 Tips for customizing your new iPad

Whether you purchased an iPad for personal use or work, there are several things you need to configure before using it. But if you’re not familiar with the menus on the Settings app, these five tips will help. Touch ID The first thing you must change is iPadOS’s fingerprint recognition features. When configured properly, this […]

,

Fileless malware: The invisible threat

Hackers have found a clever way to get around anti-malware software — they’re using fileless malware, a type of malicious software that’s not as visible as traditional malware. This means it can infect your entire infrastructure without you even knowing. Let’s take a closer look at how fileless malware works and what you can do […]