Small and Medium Business

Small and Medium Business | News, how-tos, features, reviews, and videos

p1200405
Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

Apple Lockdown Mode

Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry

The company is introducing Lockdown Mode to protect high-risk individuals against corrosive surveillance and attacks, and investing millions to improve protection on its devices.

Slack logo, with background by Mudassir Ali, via Pexels

Slack outage stymies some business users

The team channels platform went down at mid-morning in the US; Slack worked for several hours to find and fix the problem.

thinkstockphotos 499123970 laptop security

Microsoft touts first PCs to ship natively with secure Pluton chip

Along with thwarting malware, the Pluton chip handles BitLocker, Windows Hello, and System Guard and might help prevent physical insider attacks. The technology is also being used in Azure Sphere in the cloud.

many keys on a series of keychains / key rings / binary code overlay / password management

The 7 best password managers for business

A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

PrintNightmare vulnerability explained: Exploits, patches, and workarounds

Public exploits are available for a remote code execution vulnerability in the Windows Print Spooler that could allow attackers to take full control of systems. The vulnerability affects all editions of Windows and organizations are...

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Updated

Best new Windows 10 security features: Improvements to Intune, Windows Defender Application Guard

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 21H1 feature release.

mobile security

8 mobile security threats you should take seriously

Mobile malware? Other mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.

A hand activates the software update button in a virtual interface. [ update / patch / fix ]

The .NET patch failure that wasn’t

This month’s patch updates from Microsoft have caused few problems, and though there were some issues related to .NET, even those have been scattered.

Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

Windows 10 security: Are you on the right version?

If you're running an older version of Windows 10, It's time to review security enhancements that later versions offer to see if you need to update.

Virtual security technology focuses on the Microsoft Teams logo as someone uses his mobile phone.

Securing Microsoft Teams: The options are limited

The popular messaging and video conferencing platform comes with security and privacy risks. These are your limited native and third-party options for protecting users and data.

mobile security

Mobile security failings putting enterprises at risk

A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Microsoft Office the most targeted platform to carry out attacks

The number of attacks carried out using the popular suite has increased in the past two years as browsers become harder targets. Office files are now more popular than PDFs to deliver malware.

remote workers larger talent pool

Q&A: Box CEO Aaron Levie looks at the future of remote work

Once a company focused on cloud-based file-sharing, Box now offers features to support remote productivity and teamwork. CEO Aaron Levie talks about his company's evolution – and how the workplace continues to change.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 tips for running a successful virtual meeting

Running an online meeting can be as easy as running an in-person meeting if you follow a few simple steps. Here are five tips for taking your meetings online without missing a beat.

servers / server racks [close-up perspective shot]

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.

managing remote workers remotely

The keys to a successful remote work strategy

Getting remote work right is tough. But with a mission-driven approach and effective technology, a productive remote work strategy can really pay off.

Load More
You Might Also Like