Skype is introducing a new feature to its video call service that users have been asking about for quite some time now. Background blur. If you regularly make video calls, you’ve probably been in a situation where such a feature would have come in handy. It could be anything, really. Maybe you’re working from home […]
Category Archives: Blog
For the last several years, industry experts have been sounding the alarm about password security. We’ve known for quite some time that one of the biggest weak spots in corporate security is the fact that employee passwords are notoriously weak. Millions have been spent on security education. Seminars have been held on the dangers of […]
GSuite has added an important new bit of functionality in the form of Android App Management, which comes in two basic flavors. There are some things you can do using the company’s basic app management console, but to get access to the full range of features, you’ll need to set up an advanced account. It’s […]
An independent security researcher named Henze has discovered a potentially devastating macOS exploit that’s been dubbed Keychain, and he has posted a video demonstrating it in action. Henze has discovered other vulnerabilities in the past, so Apple was quick to take note. Here’s the problem, though: he’s frustrated that Apple’s Bug Bounty program only applies […]
Several months ago, Facebook announced a new feature that would be coming soon to Messenger. Initially, the company didn’t set a timetable for the often asked for delete functionality, but it recently made its way into the code base and is now ready for use. Granted, it’s got limitations, but is a big step in […]
Given the rate of increase in the number of hacking attacks, it was predicted early on that 2018 would be another record setting year. That came with more hack attempts and more successful attacks than were seen in 2017. Sadly, that prediction proved to be correct. What few people had anticipated, however, was how big […]
Google has a new extension for its Chrome browser, and it’s one you should strongly consider getting for all of your devices at home and in the office. The extension is called ‘Password Checkup,’ and has exactly one purpose. It securely checks your logins against a breach database in real time as you’re logging onto […]
When is a HIPAA breach not a HIPAA breach? In recent blogs we have been discussing the definition of a HIPAA data breach, and reviewed the notification requirements under the law. But we haven’t discussed the exceptions to the breach portion of the law, known as the Breach Notification law. There are a few select […]
AT&T is getting some pushback for what most industry insiders are calling a misleading indicator. It has started to appear on many new smartphones including both Androids and iPhones. With the latest update, a growing number of customers are now seeing a “5G E” indicator on their 4G phones, which leads to a momentary surge […]
Despite that there are still a shocking number of Windows 7 users spread around the world, Microsoft has kept with its previously published end of support schedule, and is no longer supporting the venerable product. The company has also begun quietly pulling the plug on applications that were central to the Windows 7 user experience, […]