PhishPoint attack looks like SharePoint

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users.

Controlling security risks of virtualization

Virtualization security often ends up on the back burner, and you probably didn’t even realize how important it is. However, like the rest of your technology, a virtualized infrastructure must be secured. To help keep yours protected, here are some of the security risks involved with virtualization and ways to control them.

Best practices for switching to Office 365

More and more small and medium-sized businesses are making the switch from on-premises systems to cloud-hosted Office 365. If you’re one of them, you need to ensure a smooth and secure transition. Here’s what you need to do. Identify your company’s sensitive data… Most files housed within your servers contain sensitive commercial and personal data […]

Steps for deleting data from your mobile

Whether you’re planning to give away your old phone or resell it, it’s crucial that you securely delete all your data first, because the last thing you need is for the new owner to have access to your sensitive information. Fortunately, you can let go of your old Android phone without any worry by following […]

Chrome: From HTTP to HTTPS

Within the last year, Chrome has helped users understand that HTTP sites are not secure. More websites use HTTPS, a safer protocol, than ever before. So, how can you benefit from this transition? Find out here. For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure […]