January 2023

MacBook Pro and Mac mini Apple recently introduced the newest MacBook Pro and Mac mini, already available for purchase. A mover, a maker, a boundary breaker, the MacBook Pro can be supercharged either by an M2 Pro or an M2 Max chip to take its power and efficiency further than ever. The laptop is available…

Details

December 2022

World Cup Phishing Attacks If you’ve been invested in watching the World Cup, you should be equally invested in staying protected against the rise in online scams. Researchers at Trellix revealed that phishing email attacks targeting users in the Middle East doubled in October 2022 and they anticipate this to continue throughout the world from…

Details

November 2022

Company Cam Company Cam, the visual-first job site communication app is a solution for a better workflow where projects, photos, videos, and conversations can all be stored together in one app in an effort to help solve communication issues. The app has several features to help various types of jobs across a company get easier.…

Details

October 2022

CyBlock Feature We currently use CyBlock for our customers for content filtering to limit what websites can be browsed from the office. CyBlock Cloud recently introduced a new feature, the Visualizer, to dramatically enhance data visuals without affecting any current filtering or reporting settings, or any saved report templates. The new feature, which should already…

Details

September 2022

Far Out Apple’s annual event took place earlier this month with the theme of “Far Out” and included many exciting announcements. Four new iPhones are being released – iPhone 14, iPhone 14 Plus, iPhone 14 Pro, and iPhone 14 Pro Max. The 14 will have a 6.1″ display while the 14 Plus will have a…

Details

August 2022

End of Basic Authentication After many years of applications using Basic authentication to connect to servers, services, and API endpoints, it will be coming to an end in Exchange Online. Basic authentication means the application sends a username and password with every request and those credentials are often store or saved on the device. Traditionally,…

Details

July 2022

Scammers on LinkedIn The US FBI has warned that scammers on LinkedIn are a “significant threat” as cryptocurrency scams have been widespread recently. Sean Ragan, the FBI’s special agent in charge of the San Francisco and Sacramento field offices said there are many potential, past, and current victims. The criminals focus their time and attention…

Details

June 2022

Vanity URLs Attackers are using customizable URLs, known as vanity URLs, on SaaS services to craft more convincing phishing links. The technique has been used for links created through Box, Zoom, and Google Docs and Forms – all familiar services many people know and likely use. Vanity URLs provide custom and easy-to-remember links, and some…

Details

May 2022

Boomerang for Outlook Send messages at the perfect time, receive reminders if your email doesn’t receive a response, and utilize a smart calendar assistant. This can all be accomplished without leaving your email for the ultimate email productivity when utilizing the Boomerang app for Outlook. To ensure you are sending well-timed emails, you can utilize…

Details

April 2022

Employee Cyber Risk Everything from endpoints, to passwords, to training, to security policies and a lack of awareness are all contributing to a higher risk of cyberattack. Employee cyber risk is a multifaceted issue that can revolve a lot around cyber hygiene. Some of the most important issues include passwords, device use, and a lack…

Details