GSuite has added an important new bit of functionality in the form of Android App Management, which comes in two basic flavors. There are some things you can do using the company’s basic app management console, but to get access to the full range of features, you’ll need to set up an advanced account. It’s […]
Many SMB owners think IT downtime only costs them a few productive hours, but there’s a lot more at stake when your systems go down. Customer satisfaction and loss of brand integrity are just two of the key losses apart from the more evident costs such as lost productivity and a temporary dip in […]
An independent security researcher named Henze has discovered a potentially devastating macOS exploit that’s been dubbed Keychain, and he has posted a video demonstrating it in action. Henze has discovered other vulnerabilities in the past, so Apple was quick to take note. Here’s the problem, though: he’s frustrated that Apple’s Bug Bounty program only applies […]
Several months ago, Facebook announced a new feature that would be coming soon to Messenger. Initially, the company didn’t set a timetable for the often asked for delete functionality, but it recently made its way into the code base and is now ready for use. Granted, it’s got limitations, but is a big step in […]
Given the rate of increase in the number of hacking attacks, it was predicted early on that 2018 would be another record setting year. That came with more hack attempts and more successful attacks than were seen in 2017. Sadly, that prediction proved to be correct. What few people had anticipated, however, was how big […]
Google has a new extension for its Chrome browser, and it’s one you should strongly consider getting for all of your devices at home and in the office. The extension is called ‘Password Checkup,’ and has exactly one purpose. It securely checks your logins against a breach database in real time as you’re logging onto […]
How to avoid falling victim to ransomware We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases the criminals behind the attack hope to get money by selling that data to other criminals. In […]
When is a HIPAA breach not a HIPAA breach? In recent blogs we have been discussing the definition of a HIPAA data breach, and reviewed the notification requirements under the law. But we haven’t discussed the exceptions to the breach portion of the law, known as the Breach Notification law. There are a few select […]
AT&T is getting some pushback for what most industry insiders are calling a misleading indicator. It has started to appear on many new smartphones including both Androids and iPhones. With the latest update, a growing number of customers are now seeing a “5G E” indicator on their 4G phones, which leads to a momentary surge […]
Despite that there are still a shocking number of Windows 7 users spread around the world, Microsoft has kept with its previously published end of support schedule, and is no longer supporting the venerable product. The company has also begun quietly pulling the plug on applications that were central to the Windows 7 user experience, […]