Tired of having to remember and manually enter extension numbers when dialing from your smart phone? It is possible now to have your cell phone automatically dial extension numbers for you. Follow the steps below (for your operating system) to modify your contacts to...
“An awareness and training program is crucial in that it is the vehicle for disseminating information that users, including managers, need in order to do their jobs. In the case of an IT security program, it is the vehicle to be used to communicate security...
ARTICLE BY CALYPTIX SECURITYRansomware attacks used to have a broad scale. Think of the massive WannaCry attack that infected 200,000 machines in 150 countries over a handful of days in 2017. Today, ransomware is much more targeted – and losses from the attacks have...
When buying a new laptop or tablet for a specific business use case; there are a few questions that should be asked of an end-user before a machine is purchased. The first question or consideration is what we would call “machine class”. As laptops are...
A interesting phony email made it past the spam filter today. This one portended to be a waiting voicemail message. As you can see in the image below, all one supposedly needs to do to listen to voicemail is to click on the included link. Of course this is not...