Now is the right time to shift to a stronger passcode for iPhone users, with police departments, federal agencies, and possible criminals, lining up to buy technology that can bypass your phone’s security. Experts say technology for unlocking iPhones is very much in circulation, so here’s everything you need to know. The problem According to […]
Google Chrome, Microsoft Edge, and Mozilla Firefox will soon support web-based biometric authentication. The leading internet browsers are expected to allow users to sign into online profiles through fingerprint scanners, voice authentication, facial recognition, and the like. Online biometric authentication through these browsers requires no additional software. Authenticate Your Profile on Your Mobile Device Chrome […]
Well, it’s time for another Tech Tidbit from me and right on cue another alert from the National Cyber Awareness system run by the good people at the United States Computer Emergency Readiness Team (US-CERT) has come in that I felt really needed to be highlighted for all of you.
Did you know you can keep your laptop connected to the Internet in areas without a Wi-Fi connection? All it takes is a portable, low-cost 4G router to make a private wireless network for their devices. These tiny devices are a great investment for employees working from the road, and we’ve got some tips on […]
Field workers. You see them every day. And you notice that they, too, use mobile devices, as now more than ever do they need to stay connected with their organizations to stay in business. This is where mobile performance management, a critical factor for any field worker to perform and finish tasks on time, comes […]
Android manufacturers routinely update their products with the latest security patches to keep users safe from all manner of threats. Or so they would have you believe. According to recent reports, Android phone manufacturers may have accidentally missed a few critical patches. Here’s everything you need to know. Missed patches Every month, Google rolls out […]
IT managers turn to virtualization to effectively scale down on cost, boost efficiency, and maximize space in their server rooms. Yet, what they didn’t expect were the drawbacks involved in this technology solution. It’s therefore essential that you’re aware of the following management issues before going all in: Backup Incorporating a robust backup system in […]
From instant messaging to video conferencing, Skype for Business offers many communication features many companies need to be productive. But before you start making calls on Skype, there are four things you should do to ensure crystal-clear quality. #1. Conduct a preliminary network assessment By conducting a comprehensive preliminary network assessment, you’ll be able to […]
Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection. Files Restore in OneDrive Previously available only to Office 365 business users, Files Restore allows users […]
The other day I was sitting in one of our Tech Talk presentations and Bob discussed the importance of Internet of Things (IoT) security. That made me think of the very real incident that happened in 2017 where a University's soda machines, light bulbs, and other IoT devices created a denial of service (DoS) attack against the University!
Malware-laced soda machines were plugged into the University's network! When it was all over, approximately 5,000 IoT devices on campus had been hacked and had to be manually reset.