Security researchers have discovered a new Android malware called DEFENSOR ID that snuck its way into the Google Play Store. Forensic analysis shows that the malware takes advantage of an Android device’s Accessibility Services to infiltrate the system and cause damage without being detected. To help you avoid this dangerous strain of malware, we’ve compiled […]
Arranging meetings that work with everyone’s schedules is a pain — especially if participants don’t work in your office. A calendar that is easy to share publicly simplifies everything from scheduling calls with clients to quarterly meetings with business partners. Here’s how you can achieve that with Office 365. Share an Office 365 calendar with […]
Microsoft is reportedly working on a new, lightweight version of Windows. The operating system (OS), currently known as “Windows Lite,” is said to be Microsoft’s answer to Google’s Chrome OS. There are still plenty of unanswered questions about the OS, but here’s what we know so far.
Did you know you can keep your laptop connected to the Internet in areas without a Wi-Fi connection? All it takes is a portable, low-cost 4G router to make a private wireless network for their devices. These tiny devices are a great investment for employees working from the road, and we’ve got some tips on […]
Mobile devices have revolutionized the healthcare industry: They’re convenient and significantly improve work efficiency and patients’ satisfaction. Yet they also come with risks. Patient data handled by those devices can be leaked. That’s why every healthcare provider needs to be extra careful about data security when using mobile devices.
Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers.
We may expect to find computers everywhere these days, from our offices, schools and airports to our pockets and wrists, but until now there’s not been much call for computers in our hospital operating rooms. But new technology is making waves in healthcare circles and could even save lives by helping surgeons and physicians make […]
In today's fast-paced, hi-tech world, wi-fi has become a commodity. Starbucks, Panera Bread, local cafe's, even your local McDonald's has free wi-fi available for its patrons. It's very convenient, however you could be opening yourself up to online ID theft and security breaches if you aren't careful.
There was an interesting article in the Washington Post this past Sunday about companies that are encouraging their employees to leave the email alone after hours and on weekends.
The thought behind this is to allow employees to recreate the separation between home and work, to help foster that ever elusive work-life balance.
One question we are getting lately from many customers lately is how to manage the influx of employees' devices that can connect to the corporate network. We call this phenomenon BYOD, or Bring Your Own Device. The device can be a smartphone such as an iPhone or Android, a tablet like the iPad, or even a home PC or laptop.