365 Technologies: Blog
Technology provides a competitive advantage when implemented properly. Keeping up with the latest trends is not easy. On this page we will provide you with unbiased answers to common questions we receive. This will ensure you get the information you are looking for to make sound decisions. If there is something that you would like answers to, but do not see it below, let us know and we will add it.
MSPs – the next, great cyberattack?
The cyber war may be coming to your IT-managed service provider. Is your MSP ready? Look no further than the recent cyberattack on SolarWinds, an IT-infrastructure management software company that works with technology and IT-managed service providers. It appears that…
Read MoreThe dark web: How to monitor and implement security protocols
If you think the regular web is dark, you don’t want to see the dark web. It may be time to proactively monitor your organization’s email addresses and domains to ensure you’re not already on the dark web and implement…
Read MoreCybersecurity tips for remote workers
Moving to a home office can be overwhelming and create cybersecurity issues for you, your team and organization – particularly on short notice! Here are some tips to make your home office and organization more secure: Virtual Private Network (VPN):…
Read MoreLessons from the Canva hack
We recently discovered one of our email addresses on the dark web following a hack of Canva, an Australian-based company that provides a simplified web design tool. In May, hackers breached Canva’s data, leaving approximately 139 million users’ data compromised,…
Read More7 under-the-radar cybersecurity threats
Some cyberthreats get all the publicity. So, it’s great that Wired recently published an article about seven lesser-known cybersecurity threats that everyone should know about; true, they may not be as “newsworthy” as ransomware attacks and data breaches, but they…
Read MoreRansomware stats and facts
When ransomware attacks, it can be costly in many ways. To understand the real impact of ransomware, we’ve summarized Comparitch’s article, “2017-2019 Ransomware statistics and facts.” When ransomware encrypts a computer file system it can cause irreversible data loss. Even…
Read MoreFive ways to spot phishing email scams
Phishing email scams are getting sneaker and harder to recognize. Phishing is a fraudulent attempt to obtain sensitive information (such as usernames, passwords, or credit card details) by posing as a trustworthy entity or person in electronic communication. The fraudsters’…
Read MoreGift card scam uses boss’ email address
Sometimes it’s good to question the boss. If you get an email from your boss asking you to purchase gift cards, you may really be communicating with scammers. For the past six months or so, there’s been an email scam…
Read MoreProtect your PC by doing these three, simple things
A couple of years ago, I wrote a post about how to keep your PC running in tip-top shape. These tips continue to be important to ensure your PC has a long life, so I’m reposting it today with some…
Read MoreProperty managers need IT too
Technology is changing and impacting the property-management landscape. Consider electronic transactions, online financial and tenant data-storage, and smart devices that are now regularly installed into offices and residences (also known as the Internet of Things). As building systems, processes, and…
Read More