Social engineering attacks are happening every day, and it is often the first technique hackers turn to, because "calling somebody on the phone is so much easier than doing the technical magic you need to break into a computer." Is your name and your phone number all it takes for a hacker to take over your cellphone account? ... Read More
- Published: 04 Jan 2019
When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter
- Published: 28 Dec 2018
Chromebooks have provided businesses with a different option for their computing needs, if it fits with their practices. Here, we’ll explore the different factors that make Chromebooks a good choice, and some of the more appealing features that they can provide.
- Published: 01 Feb 2018
Sometimes when your workstation feels bogged down, a relatively cheap and simple hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.