Blog
Google to start enforcing two-step verification enrollment
Google will soon start pushing more Gmail users and Google Account holders to enable two-step verification — the extra layer of security that can protect people when their credentials have been phished or exposed through a data breach. May 6 is "World Password...
Understanding GDPR Data Controller in 5 easy steps
By now most of have heard of the General Data Protection Regulation (GDPR). But in case you’ve been carefully avoiding the news since 2017, it’s a law put in place by the EU which strengthens the protection of citizens’ data. GDPR has brought with it some very...
Great Ideas to Boost Macbook Performance
Guest post by Justas Markus Do not expect a Macbook to perform the same way that it does the first time you start it. A time will come when you start to notice that it takes longer for applications to launch or that the loading screen after each restart is also not as...
Perfex CRM vs WHMCS
When it comes to billing systems, most people in my line of business have heard of WHMCS. It is the defacto billing and automation system for most hosting providers but it is also very popular with many other types of business as well, such as ISP's, website design...
G Suite vs Microsoft 365 Comparison
Trying to decide between G Suite vs Microsoft 365 (formerly office 365) for your business email address? Looking for a Google Apps vs Microsoft 365 comparison to see which one is better? G Suite (formerly Google Apps) and Microsoft 365 offer professional business...
Worm phishing campaign is a game-changer in password theft & account takeovers
A phishing attack taking place against an organization has revealed a crafty method to bounce between victims in a way deemed "ingenious" by a researcher. On September 29, cybersecurity architect and bug bounty hunter Craig Hays outlined a recent phishing...
Recent Comments