Blog Posts

HomeBlogAll PostsBlog Posts
21 08, 2017

Cyber criminals target victims by making them install Chrome extensions

August 21st, 2017|Categories: Blog, Blog Posts, Network Security, Security|

In these recent attacks cyber criminals target victims using social media networks, specifically those individuals inside financial organizations and those who make financial transactions. These victims were then called using the phone by the attacker posing as bank employees, who then used social engineering tactics to trick the victim to install an "update" to the bank’s [...]

10 07, 2017

Businesses must learn to combat cyber attacks

July 10th, 2017|Categories: Blog, Blog Posts, Security|

After two recent ransomware cyber attacks disrupted businesses, factories, hospitals and schools in over 150 countries, there are many lessons to be learned. The WannaCry ransomware was developed to take control of system data. It encrypted files as soon as the virus became active and demanded a ransom to be paid via Bitcoin, a cryptocurrency [...]

22 05, 2017

Phishing malware attacks target DocuSign Customers

May 22nd, 2017|Categories: Blog, Blog Posts, Email Security|Tags: , , , |

DocuSign, a major provider of electronic signature technology based in San Francisco, admitted that a series of recent phishing malware attacks targeting its customers and users was the result of a data breach at one of its computer systems. The company stresses that the data stolen was limited to customer and user email addresses. The incident [...]

3 11, 2015

Microsoft shrinks OneDrive for Office 365 customers

November 3rd, 2015|Categories: Blog, Blog Posts, Cloud Computing|

Microsoft is ending its unlimited OneDrive cloud storage plan and will put a cap of 1TB on storage for Office 365 consumers.The company said its earlier unlimited storage offer had been misused by a few users of its Office 365 Home, Personal or University application, who backed up "numerous PCs and stored entire movie collections [...]

3 11, 2015

Revealed: The top 10 apps that companies hate

November 3rd, 2015|Categories: Blog, Blog Posts|

MobileIron surveyed 6,000 companies that run its software Companies are wary about what employees are doing on their smartphones. Be it data loss or time-wasting, a growing number of employers are actively stopping staff from using certain apps on company-controlled devices.After surveying the roughly 6,000 companies that uses its mobile security management software, MobileIron determined [...]

3 11, 2015

10 years after Hurricane Katrina disaster: IT lessons learned

November 3rd, 2015|Categories: Backup & Recovery, Blog, Blog Posts, Business Continuity, Cloud Computing, Disaster Recovery|

Ten years after Katrina devastated New Orleans, IT pros say being less dependent on physical locations is just one of the keys to ensuring your company doesn’t go out of business when disaster strikes. It’s hard to be truly prepared to take the full impact of a Category 5 hurricane. Ten years ago, in the [...]

2 11, 2015

Windows 10 upgrade cycle has CIOs bracing for (and embracing) change

November 2nd, 2015|Categories: Blog, Blog Posts|

CIOs say the shorter upgrade cycles for the Microsoft Windows 10 operating system are a breath of fresh air. Microsoft’s previous approach of protracted revisions seem antiquated in an era of constantly refreshed cloud and mobile platforms. Windows customers say that while the shift is another sign that the 40-year-old software giant is modernizing its [...]

15 10, 2014

5 Predictions For Mobile Apps In 2015

October 15th, 2014|Categories: Blog Posts|Tags: |

By Andrew Gazdecki, Published October 14, 2014 Mobile apps are definitely here to stay. Experts advise, however, that getting too comfortable with a mobile strategy and not adapting in the ever changing app market is a recipe for disaster. Below are a few predictions we have for 2015 at Bizness Apps: 1. Mobile Apps Will [...]

15 10, 2014

The 5 Levels of Lead Qualification

October 15th, 2014|Categories: Blog Posts|

By Bob Apollo, Published October 15, 2014 Sirius Decisions recently published some very interesting research into the subject of when marketing-generated “leads” are regarded as being “sales ready”. The results surprised me, and I suspect that they might surprise you, as well. There is, of course, no one right answer that covers all extremes from [...]

15 10, 2014

YouTube served malicious advertisements, Trend Micro says

October 15th, 2014|Categories: Blog Posts|Tags: , |

Malicious advertisements, some of which were displayed on YouTube, redirected more than 113,000 people in the U.S. to harmful websites in just a month, Trend Micro said Tuesday. Although online advertising companies try to detect and block such ads from being circulated on their networks, bad ones sometimes get through. Such ads can be very [...]

Load More Posts

From Our Clients

Whether it is the simplest of tasks such as adding a workstation or complex server and telephone system upgrades, we have had nothing but exceptional service.

Anthony C.

Useful Shortcuts