Your source for IT news and tech tips.
Report: Malicious Email Attacks Jump 85% in Q3, Ransomware Reigns Supreme | TechRepublic | Malicious messages hit their peak in the third quarter of 2017, with ransomware and email fraud playing a major role, according to Proofpoint. | Microsoft is Working On a Foldable Device with a Focus on Pen and Digital Ink | Windows Central | Although Microsoft's mobile efforts in regards to Windows 10 Mobile are dead, the company isn't pulling out of mobile altogether. | US Voting Server in Election Security Probe is Mysteriously Wiped | The Register | A computer at the center of a lawsuit digging into woeful cyber-security practices during the US presidential election has been wiped. | | | Computer Tips & Tricks Everyone Should Know | TechSpot | There are always new ways to sharpen your computer skills and we bet that you will find at least one useful thing here that you didn't know before. | Tethering in iOS 11: Fixing Your iPhone’s Personal Hotspot Issues | MakeUseOf | Is your newly updated iPhone not working as well as it did under iOS 10? It’s not just app crashes and compatibility problems, network issues have likely surfaced too. | | Today's Tip from Controlling Your SaaS Environment | | In the legacy world, security was done from the inside out. IT secured everything inside the environment first—e.g., the computer someone was using, the servers that applications were running on, the internal network—and then moved on to the external network. Today, the direction is reversed. IT must take an “outside-in” approach. IT must first secure the applications that are in the cloud and then configure all the data that lives outside of the network. Then IT can work on securing identity, external networks, and device management. But managing and securing all the data that lives outside the network isn’t easy. The first hurdle IT has to overcome is the sheer scale and complexity of the data sprawl. |
| | Get the book at controlyoursaas.com. |
| | | Asana for Gmail: The Best of Both Worlds | Asana | With this add-on, you can turn your emails with clients, customers, and teammates into actionable tasks that are tracked in Asana—without leaving your inbox. | Threat Trends and Tactics from the Latest Security Intelligence Report | Microsoft | As the cloud becomes an integral tool for modern businesses, it also has turned into an attractive target for malicious attacks. Providing an insightful picture of the threat landscape, the latest Microsoft Security Intelligence Report (SIR) draws from billions of security signals that Microsoft processes in its consumer and enterprise services on a monthly basis. | Shields Are In, Brooms Are Out: This Year's Top Halloween Costume Trends | Google | What are you dressing up as this year? Every Halloween, people across the United States turn to Google to search for what to wear on the spookiest night of the year. | | Meetingbird Chrome Extension Superpowers for Gmail, Google Calendar, and Google Inbox |
|
|