Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).
What is VPN?
Simply put, a VPN is a group of servers you connect to via the internet.

Microsoft’s new productivity apps are live

In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users.

VoIP options: Open source vs. Proprietary

Switching to internet-based phones gives you the chance to enjoy innovative new call features and significant cost reductions. There are a lot of options when choosing which voice over IP (VoIP) platform you use, but first you need to pick whether you’ll use an open-source or proprietary system.

Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.

Google My Business now accepts appointments

There are countless platforms that showcase, review and link to small businesses, but few have as much impact as Google does. Although business owners can’t choose where their site ranks in the search results, they can edit information that is displayed and insert some flashy new features.

Google reviews: how to make them count

Google has recently modified their search results to display ratings from review sites like Facebook and Yelp. While this may seem like a small change, it has actually made reviews more important than ever in terms of SEO. With the following tips, your company can shine in the Google search results.

Unified Communications Explained

There was a time when “voice” was the sole business communication solution. Then, we were introduced to emails, texts, and chats, all of which are extremely useful and are here to stay. But wouldn’t it be nice if there was a communication solution that integrated everything -- voice, messaging, video -- into one platform? That’s where unified communications come in.

Hackers exploit vulnerable Office feature

As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen.