The shorthand answer is yes. Scammers evolve their methods as technology progresses, employing AI-based tactics to make targeted phishing more efficient. If phishing didn’t continue returning benefits, then scammers would move on to another type ofattack. But that hasn’t beenRead More
How often should employees be trained on cybersecurity practices?
You’ve just completed your annual phishing training where you teach employees how to spot phishing emails. You’re feeling good about it, until about 5-6 months later when your company suffers a costly ransomware infection because someone clicked on a phishingRead More
The best approach to multi-factor authentication
What’s the most convenient? Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest andRead More
Is Microsoft Edge the new “it” browser?
Microsoft Edge recently surpassed Firefox in worldwide desktop browser market share and is now the #3 Desktop browser in the world behind Chrome and Safari. Why has Edge become so popular? One reason is that it adopted the Chromium frameworkRead More
Pros and cons of Windows 365 cloud PC
While many companies have moved most of their workflows to the cloud, there is still a key component of office operations that is location-based. Most companies still rely on desktops and laptops to allow employees to access critical software andRead More
Are two monitors really more productive than one?
When you see those people with two monitors, you may assume they do some specialized workthat requires all that screen space, or they just really like technology. But having the additional display real estate that a second screen provides canRead More