Malware CoinHive becomes the 6th most common Malware
CoinHive, the cryptocurrency miner that made the news in September when it was discovered that the EITest campaign was using it to trick victims into paying for their services or handing out financial data via tech support scams. However, a new report from coindesk.com reveals that the malware is becoming more widespread as it reaches 6th place on […]
CT Link Systems, Inc. Adopts Microsoft Teams!
Office collaboration is becoming key to success in businesses right now. Business mobility and workforce communication have become so important that it can lead to you losing a big sale to your competitors. CT Link Systems, Inc. in an effort to improve their collaboration has decided to adopt Microsoft Teams. Below are a few functions […]
Simplify and Collaborate your Work with ShareFile!
2017 was a transformative year for Citrix ShareFile. ShareFile helped companies (and continuous to) with their cloud journey by creating efficiency in their work by allowing users to collaborate in the digital workspace from anywhere. Even after helping many companies with their collaboration, they continued to improve ShareFile; they added additional features earlier this year […]
Your Data at Large: Some of the Common Security Pitfalls
With data mobility’s rise, you would expect that security of data would increase as well. However, many of the controls to mitigate the risk of data exposure still rely on traditional protection. Direct attacks, simple mistake, and even negligence are still major reasons as why data is lost. Below are some of the most common […]
Office 2007 Support has officially ended
Office 2007’s support officially ended last October 10, 2017. This doesn’t mean that you will lose all your Office 2007 apps, nor will you lose any of your data associated with Office 2007. Then what exactly does this mean then? One big issue from discontinued support would be security; with no support, you could be […]
KRACK Vulnerabilities creates huge Security risks for WiFi
On October 16th, 2017, ten new security vulnerabilities, referred to as Key Reinstallation Attack (KRACK), were announced that target the session establishment and management process in WPA(1/2)-PSK and WPA(1/2)-Enterprise. This marks the first security vulnerability of WPA2 since its introduction. The vulnerabilities are related to different key handshakes, used between the Wi-Fi supplicant (client) and […]