IT

This month we have 50 unique CVE’s, 5 technologies with critical updates, and one critical zero-day vulnerability.  Microsoft  announced that a critical zero-day vulnerability  had been found in the scripting engine of the Internet Explorer (IE) web browser. The vulnerability  impacts IE across all versions of Windows...

Having an online presence is key to running a successful organization, and it all starts with a great website. Most organizations use WordPress as a popular content management system, but did you know that’s only half the battle? The other half includes having a website that runs...

This year make sure you, your colleagues, and your organization are protected by practicing good security hygiene. If you don’t work in the IT department, this might feel inconvenient and bothersome, but remember that building daily habits takes time and practice! Having good security habits will limit your exposure to cyberattacks, something that is unfortunately increasing rapidly over time. We strongly suggest you make the...

According to the 2019 MidYear QuickView Data Breach Report, the first six months of 2019 saw 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records. Though a majority of these breaches had a moderate or low severity score, no organization is too small to be on the...

For years, setting up a new computer, whether it’s for new employees or rebuilding a computer due to a failure or loss, has been a very tedious process. Employees are impacted by the time it takes to recover. Companies are pained by the cost it takes to build these computers. User licenses are not always available,...

Voice calls are still the backbone of internal and external communication for organizations across any industry. To ensure this communication is effective, it often needs to be transcribed. For example, if you have an important meeting with a client, somebody would have to take notes throughout the meeting for future reference, correct?...