Blog

Does the CIA have access to your router?

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

Apple focuses on enterprise users with iOS 11

Apple focuses on enterprise users with iOS 11

Businesses were quick to adopt Apple’s iPad in the workplace since its release in 2010. It didn’t take long for it to become one of the most popular Apple devices, even though many users regarded it as just an oversized iPhone. All that changed with the release of the iPad Pro, which Apple is positioning as a practical replacement for the PC or Mac.

Get more out of Office 365 with Power BI

Get more out of Office 365 with Power BI

The benefits of Office 365 have totally changed the way most businesses operate, and it’s hard to believe anything else could have been added to make it even better. But lo and behold, Microsoft has added another excellent feature for getting a better return on your productivity software investment.

Keep the Cloud affordable with these tips

Keep the Cloud affordable with these tips

Despite the Cloud being a powerful and cost-effective solution that many small- and medium-sized businesses welcome with open arms, there are hidden costs that some business owners might not be aware of. It might cost you little at first, but it has the potential to snowball and cost more than your weight in gold.

Gmail gets anti-phishing enhancements

Gmail gets anti-phishing enhancements

Although hackers continue to develop new viruses and bug exploits, the most effective weapon in their arsenal is a simple email. All a would-be cybercriminal has to do is write a convincing message (or pretend to be a trustworthy entity) to persuade a victim to download a malware-ridden file or surrender their personal information.

How to keep Mac computers safe

How to keep Mac computers safe

When it comes to Mac devices, data privacy and security should be your #1 priority, not an afterthought. Without implementing sufficient security measures, you’re leaving the door open for cybercriminals to ransack your sensitive data. Keep your bases covered and fortify Mac security with these six tips:

The basics
Let’s start with the basics and head over to the Security & Privacy pane in System Preferences.