Blog

VoIP phishing: how scammers do it

VoIP phishing: how scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to scam.

Windows 10 Fall Creators Update: What’s new?

Windows 10 Fall Creators Update: What’s new?

Microsoft is releasing the Fall Creators Update in September that promises an even better array of features. Windows 10 users can expect improvements to OneDrive file management, battery usage, ransomware protection, and more. We have rounded up some of the new and noteworthy features for business users.

3 Rules To Keeping Your Data Safe In The Cloud

3 Rules To Keeping Your Data Safe In The Cloud

 
If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So it’s important that you, the user, are being smart about security.

6 CRM best practices you need to know

6 CRM best practices you need to know

Most companies have customer relationship management (CRM) software to help them keep track of contact information and purchase history. But having a large database is worthless if you’re not using it to build long-lasting relationships. To keep existing clients coming back and bring new ones in, follow these CRM best practices.

Google’s cloud platform receives an upgrade

Google’s cloud platform receives an upgrade

As more and more businesses move their IT resources into the cloud, it’s no wonder that a company as big as Google is doing everything it can to upgrade the products it delivers over the internet. The search giant has at least 60 separate cloud services, and its most recent release makes them all faster.

Ways to protect your company mobile devices

Ways to protect your company mobile devices

Mobile devices can’t accomplish everything that desktops and laptops can, but that doesn’t mean they’re not important to businesses. More and more employees are using smartphones and tablets to increase productivity and enhance collaboration. But before you adopt a mobile device policy, you must keep them safe from cyber criminals.