Blog

March 23rd, 2017

2017March23Windows_CDigital advertisements are ubiquitous across the internet. And just as users started to come to terms with that, Microsoft has taken ads one step further. The Windows File Explorer has begun to show ads for services like O365 and OneDrive, and if you’re wondering how to disable them, this article is for you.

Who is getting these ads?

Right now, we’re still unsure of how widespread Microsoft’s new advertising strategy goes. Not every Windows workstation has started displaying File Explorer banners, and based on some overwhelmingly negative reactions online, the campaign might get shut down before it even reaches your desktop.
Read more.
Topic windows
March 22nd, 2017

2017March22Security_CAlthough a ransomware infection might feel targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, but the further it goes, the more resources are allocated to fighting it. If your data is held hostage, always check these lists for free decryptors first.

The state of ransomware in 2017

It’s been almost 30 years since malware was first created that could encrypt locally-stored data and demand money in exchange for its safe return. Known as ransomware, this type of malware has gone through multiple periods of popularity. 2006 and 2013 saw brief spikes in infections, but they’ve never been as bad as they are now.
Read more.
Topic Security
March 17th, 2017

2017March17Business_CThere are so many variables that go into order fulfillment and shipping that it’s no wonder an entire field has sprung up around streamlining these processes. If you’re looking for a great way to add value to your business, an order management system may be just the thing for you.
Read more.

Topic business
March 16th, 2017

2017March16Web & Cloud_CA small error in Cloudflare’s code has spilled millions of login credentials, personal information, and cookies all over the internet. The bug, known as Cloudbleed, was discovered by the internet security company last month, and since then, they have worked to mitigate the security risks. So far, it appears that hackers have yet to exploit this vulnerability, and that’s why internet users have to remain vigilant. Find out what Cloudbleed can do and how you can stay safe.
Read more.

Topic Web & Cloud
March 15th, 2017

2017March15Hardware_CCybersecurity is one of the final bastions of hardware superiority. More and more IT solutions are being hosted in the cloud, and business owners are being told that software is all they need to get the job done, which is half true. When it comes to perimeter security you definitely need a hardware firewall, with a little something extra...

Software firewalls

Calling a piece of software a “firewall” is a bit of an exaggeration. Installing it on a local hard drive is more like locks on a door than impenetrable walls. When data is scanned for threats by a software firewall, the information it contains has already been passed through your router, network switch, and finally your local hard drive.
Read more.
Topic Hardware