The Issue: Recently we came across an issue where someone had inadvertently installed a newer Office 365 version on to their remote desktop server. Yes, I know they shouldn’t be able to but IT consulta...
Exploiting security flaws is one of the major tactics used by cybercriminals to attack organizations. Vulnerabilities are an unfortunate fact of life for operating systems, applications, hardware devices and da...
A notebook PC powered by Microsoft Windows offers several advantages: Windows offers the most flexibility to run just about any app, as well as the choice of any browser you choose. You can tweak and configure ...
Malware has taken to mobile applications, namely those in the enterprise. Enterprise employees use mobile applications to share data, send packages, manage email, and otherwise juggle the needs of a functioning...
There is always that one superhero willing to play nice with the villain. In the world of tech hackers, HackerOne is that superhero. HackerOne acknowledges that modern security is hacker-powered. They have crea...
Spring is fully upon us and the summer heat is looming in the not too distant future. Many of us are planning out our summer vacations to beat the heat and spend time with our friends and families. While our mi...