365 Technologies: Blog
Technology provides a competitive advantage when implemented properly. Keeping up with the latest trends is not easy. On this page we will provide you with unbiased answers to common questions we receive. This will ensure you get the information you are looking for to make sound decisions. If there is something that you would like answers to, but do not see it below, let us know and we will add it.
Email Safety Best Practices โ How To Avoid Malware, Viruses, And More!
By Michael Anderson | May 9, 2017
Email. Love it or hate it, you have to use it. Even in 2017, thereโs no replacement for email. Itโs still the standard โde factoโ communications method used by almost every company out there โ and thatโs unlikely to change anytime soon. Thatโs why itโs more important than ever to avoid malware, viruses, and ransomware…
Read More → The โSโ in HTTPS is More Important Than You May Think
By Michael Anderson | January 19, 2017
It would be an understatement to say that security, particularly encryption, is important while browsing the web. Though it was only recently that encryption became a major pain point for government regulation, encryption has been around for a very long time. The average user can get a taste of online encryption through the average website…
Read More → Microsoft Outlook Users Should Be Wary of New Ransomware
By Michael Anderson | September 8, 2016
Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS (Distributed Denial of Service) attacks, which is…
Read More → The Internet Dramatically Changed the Publishing Industry. What About Your Business?
By Michael Anderson | July 22, 2016
Itโs well-known that publishers are a major component of an author sharing their work with the world, but recent innovations threaten to disrupt the status quo of the industry. Like many industries, the publishing industry has been changed significantly by the introduction of new technologies that afford writers more liberty when producing their work. What…
Read More → Reduce Network Security Risk in One Easy Step
By Michael Anderson | February 22, 2016
Network security can be a complex topic, and certainly, there are many things to consider. With that said, hereโs one simple thing you can do to reduce security risk in your network: Remove Administrative rights from users that donโt require them. According to a report released by security firm Avecto, itโs estimated that a solid…
Read More → Windows 10 Is Here – Everything Your Business Needs to Know
By Michael Anderson | August 10, 2015
Microsoftโs latest PC operating system arrived with fanfare on July 29th, and has received overwhelmingly positive reviews so far, but is it ready for your business? Letโs take it for a spin and find out. Is Windows 10 Free? First, letโs talk about how Microsoft is handling the licensing/upgrade model. This has caused a lot…
Read More → Your Solid State Drive May Outlive You
By Michael Anderson | June 22, 2015
When shopping for a new computer, youโre faced with a choice; go with a traditional hard drive (HDD), or a solid state drive (SSD). The benefits of an SSD are many, but are they enough to justify the extra expense? To accurately answer this question, you first need to consider your computing needs. If youโre…
Read More → Microsoft Skips Windows 9 While Businesses Skip Windows 8
By Michael Anderson | May 20, 2015
The release of Windows 10 is fast approaching, and itโs suspected that it will arrive sometime this summer. However, Microsoftโs latest OS release, Windows 8.1, is still being left in the dust by Windows 7 in terms of sheer popularity and usage. Whatโs the current state of Microsoftโs Windows OS economy? ComputerWorld reports that two-thirds…
Read More → SECURITY THREAT – VENOM – 365 Clients not impacted
By Michael Anderson | May 13, 2015
Clients โ A new security threat is getting some headlines. It is called VENOM (Virtualized Environment Neglected Operations Manipulation). This is a serious security hole, which allows an attacker to move from within one virtual machine, across the virtual host, and into other virtual machines. The vulnerability affects the decade-old free and open source hypervisor…
Read More → Social Engineering: Not all Hackers Target Technology
By Michael Anderson | May 12, 2015
ย The nature of hacking is to take advantage of weak points and exploit them for some kind of profit. This is usually seen in flaws or vulnerabilities found within the code of a program or operating system, but these flaws can be psychological, too. Hackers are increasingly taking advantage of a concept known as โsocial…
Read More → Search for a topic
How can we help?
Whether you need immediate help with an IT issue or want to discuss your long-term IT strategy, our team is here to help.
Call us at (204) 336-6518 or complete the form below and we'll help in any way we can.