People have been finding ways to rip each other off for centuries — historians say the first documented case of financial fraud occurred in ancient Greece around 300 B.C. It is no surprise that fraudsters in 2020 are using the global pandemic to hoodwink victims on a massive scale.
The Art of the Steal: How Fraudsters Are Exploiting Email
What’s Your Best Choice for Cloud Storage?
Storage has always been one of the more logical use cases for the cloud — it provides a cost-efficient and easily accessible environment with almost infinite scalability. The benefits have been particularly pronounced during the pandemic, allowing companies to ensure their mobile and remote employees can get the files they need, whenever and wherever they need them.
Can Your Firewall Inspect Encrypted Traffic?
Two-thirds of malware attacks are encrypted, driving the need for security tools that can detect these threats without performance lags.
More and more traffic traveling across the Internet is encrypted. According to the Internet Trends Report by venture capitalist Mary Meeker, 87 percent of web traffic was encrypted at the beginning of 2019, compared to 53 percent in 2016. Data from Netmarketshare shows that encrypted web traffic exceeded 90 percent by October 2019. A Google report puts the figure at 95 percent based upon the number of web pages using the HTTPS protocol loaded into its Chrome browser.
So Long, Office 2010
As popular productivity suite is phased out, organizations should turn their focus to cloud-based Microsoft 365.
Microsoft’s popular Office 2010 productivity suite reaches end-of-life status on Oct. 13. After that date, Microsoft will no longer provide technical support, security updates, patches or bug fixes.
It Doesn’t Take a Bad Actor to Create an Insider Threat
Are Consumer-Grade File-Sharing Services Putting Your Data at Risk?
It has always been difficult to keep documents up-to-date and ensure that everyone on your team has the right version. Now that many employees are working remotely and sharing documents via mobile devices, the problem has only become more acute.
Cloud-based file-sharing services such as Dropbox, iCloud and Google Drive seem to provide a simple solution.
Smart Technologies Improve Wi-Fi Performance and Reliability
As we noted in our last post, the work-from-home transition has dramatically increased wireless network workloads. As more people with more devices consume more bandwidth, Wi-Fi networks based on outdated equipment and legacy standards are experiencing more connectivity, performance and management issues.
5 Tips for Boosting Your Wi-Fi Performance
Worldwide Wi-Fi traffic has surged to record levels as business, governments, schools and hundreds of millions of people have become reliant on their wireless networks. The increased traffic volume has also brought performance challenges, with increased reports of dropped connections, slow downloads, increased interference and broadband restrictions.
Beyond Backup
Data protection is just one component of a disaster recovery plan.
What would happen to your business in the event of a disaster?
According to experts, the vast majority of business owners would respond, “I don’t know.” The sobering reality is that very few businesses have disaster recovery (DR) plans — of those, very few are complete and up-to-date.



