Blog

Zoom Security – What You Need To Know

There has been a lot of buzz around the security issues and vulnerabilities around Zoom recently. We wanted to compile them for you in a concise and easy to understand way.

Zoom has found a way to make a very user-friendly and easy video conferencing system, unfortunately this has come at the expense of security.

Essential tools for remote working

The global pandemic hasn’t defeated many hard-working managers and teams. They’re protecting themselves from the virus, meeting deadlines, collaborating on projects, and hitting business goals, all while working from home. In this article, we’ll go through a list of the essentials tools for the new normal that is remote working.

Have your staff work from home with the proper gear

One of the major hurdles of shifting to a work-from-home setup is that the hardware your employees have at home can be very different from what they’re used to at the office. More than their computers and smartphones, these are the things your staff will need to set up their own home office.

Working From Home FTI (Frequently Troubleshoot Issues)

Due to COVID-19 more and more employees are working from home. We have been helping our clients make this transition and have discovered a few issues we are frequently helping our clients' employees with. So we have put together our FTI (Frequently Troubleshot Issues)

Troubleshooting is all about narrowing down all of the potential causes of an issue until only one item remains, the root cause.

Cloud services in demand due to pandemic

Providers of cloud-based services are experiencing a steep increase in demand these days, as the COVID-19 pandemic goes global. Because of the pandemic, many employees are working from home, relying on digital productivity and collaboration tools to get their job done.

How businesses are impacted by COVID-19

Businesses and consumers are facing a lot of uncertainty because of the coronavirus pandemic. As COVID-19 continues to spread, the only thing that seems certain is that it will impact businesses, particularly the way they operate and use technology.

Increased reliance on communications technology
The need for remote interactions and stronger communications technology will inevitably increase.

Autocomplete password risks

Web browsers come with features to improve user experience. One of the most popular ones is auto-fill passwords. These are designed for users to store and automatically use their account credentials to access websites and other applications. While auto-fill passwords are convenient, they come with security risks.

IoT security 101: Things to remember

Internet of Things (IoT) devices and appliances are proving to be excellent ways to leverage automation in pursuit of profitability and customer satisfaction. As with any device that connects to the internet, they need to be configured to protect business and personal data.

Windows SMBv3 Vulnerability

Microsoft has issued an alert (ADV200005) regarding a remote code execution vulnerability (CVE-2020-0796) in Microsoft Server Message Block 3.1.1 that could give an attacker the ability to execute code on the target SMB Server or SMB client. It is reported that this vulnerability is “wormable.

OneNote: Microsoft’s most underrated app

The hidden gem of Microsoft Office, OneNote has your digital note-taking needs covered. This piece of software is essentially a digital notebook in which you can organize or visualize your ideas using text, video, audio, and other multimedia sources.