Blog

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk.

Data safety: The non-technical way

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us!
Cover up your webcam
There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, James Comey, and NSA whistleblower Edward Snowden all believe their webcams could be compromised.

Is your browser safe from Spectre?

The Chrome, Safari, Microsoft Edge, and Firefox browsers may not be as safe as you think. Security researchers recently discovered that computer chips manufactured in the past two decades contain major security vulnerabilities. One can be used by hackers to gain access to sensitive data.

Why UPS is necessary for network equipment

Fire, flood, storm, and other disasters can lead to power failure and productivity loss. Using uninterruptible power supply (UPS) for computers ensures you never lose unsaved work, but without internet, you’re practically crippled. To avoid that dilemma, we highly recommend using UPSs for your networking equipment, including cable modems, wireless access points, and routers.

How to move files from Android to computer

There’s a lot of good things to say about how-to articles. They’re simple, practical, and if we follow instructions correctly, they can give us a sense of accomplishment. From basic life skills such as learning how to change a lightbulb or how to fry an egg to more technical topics like learning how to write JavaScript or how to perfect a soufflé, there’s always someone out there who is going to need a how-to article on something.

Virtualization vendors fix processor flaws

Everyone has been trying to make sense of recently discovered vulnerabilities that affect almost every computer in use today. All you really need to know about the Spectre and Meltdown bugs is that they make it very easy to spy on private information stored on a computer.

Take Google Search to the next level

Google has become so popular that its name is actually a verb in the dictionary. Despite people using Google every day, many don’t know that the search engine’s simple-looking interface is chock full of features that’ll help you find information faster.

How will AI impact internet telephony?

Artificial Intelligence (AI) brings to mind robots that can perform tasks and think like human beings. While that's certainly possible in the future, AI today is simply an intuitive set of technology that automates business processes. It’s been around for decades, and now it’s poised to make significant improvements to VoIP technology.

Beware Of Apps Bundled With Your Windows 10

Have you recently purchased new laptops or computers? Don’t get too excited. A new report proves that pre-installed software such as free trials and web browser toolbars can pose high-security risks. So if you want to maximize your new investment, here are some things you might want to know:

Tavis Ormandy, a researcher from Google's Project Zero, recently discovered that a compromised password management app, Keeper, had been installed with some versions of Windows 10. For a brief period, Keeper's browser extension, when enabled, allowed websites to easily steal login credentials.