What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer’s memory. Who or What is Vulnerable? […]

Azure Stack has commanded plenty of loyal followers since its release, and it’s easy to see why. The platform provides many of the same great benefits users found in Microsoft’s Azure. Chief among them is the impact on multi-cloud environments. Building and deploying applications have become easier than ever before, and users are now able […]

Is It Safe For Me To Use The Airport’s Public Wi-Fi When I Travel? Most airports around the U.S. and abroad provide free Wi-Fi service to travelers stranded in their terminals, waiting for their flights. While this service may appear to be generous, a recent study by Coronet, a cybersecurity company, suggests you might want […]

What Are The New Updates On Microsoft Office 365 For August 2018? As Microsoft continually works on improving the Office 365 experience for its users, the new August 2018 updates include some helpful, fun, and entertaining new experiences for Microsoft Office 365 users. Let’s take a closer look at the new updates. Microsoft Whiteboard As […]

Using Rules To Organize Your Outlook 2016 Inbox The purpose of Rules in Microsoft Outlook is to help you organize your email and receive updates if items are changed. Rules can save you time, keep on top of high priority tasks, and reduce the clutter of your Outlook inbox – if you know how to […]

The Newest Forms Of Ransomware & How To Protect Your Business From Them The Situation Ransomware is now one of the top security concerns for businesses and organizations of all sizes. The City of Atlanta was hit with a ransomware attack called SamSam in March, crippling some important departments like their court system, sewer infrastructure […]

In a recent Forbes article, former VP of Strategic Communications at SAP, former Chief Communications Officer at Oracle, and current founder and president of Evans Strategic Communications LLC, Bob Evans, weighed in on the cloud wars between Amazon and Microsoft. Evans broke down the 10 key elements of Microsoft’s progress and strategy in the words […]

They are the next best thing to hauling your laptop around to school and on flights, and they’ve become the weapon of choice for parents with fussy toddlers in public spaces. But while tablets have earned their accolades in recent years, that’s not to say choosing one to take home is an easy task. With […]

End-Of-Life Vs. End-Of-Sale The end of a product’s lifecycle can mean trouble for companies that haven’t prepared for the inevitable. If your organization uses certain products on a daily basis, you may find it difficult to keep up with the different dates revolving around these products’ unique life cycles. But failing to do so can […]

Phishing is just one of many tools in a hacker’s repertoire and happens to be one of their most effective.  Through phishing, hackers dangle their bait in front of preoccupied employees who would never dream that their PC could provide an open door for a hacker.  That’s why it is so important that employees understand […]