Blog

Google releases year-long security study

Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s year-long security investigation provides the details.

Use Google search to schedule appointments

For most people, Google is the first stop when searching for a specific business. And in some cases -- like searches for gyms and beauty salons -- people are using Google to help them contact the business about an appointment. Now, the search giant has made that possible right from its results pages.

The ultimate guide to manage Google reviews

Strategies for attracting new customers are always changing, and Google is shaking things up yet again. Apart from well-placed keywords and link-worthy content, reviews from sites like Facebook and Yelp will be displayed in the search results.

How Google changed search results
Google’s new search algorithm is designed to lead people to high-quality products and services.

New Office attack method puts users in danger

From cloud hacks to malicious macros, hackers are becoming more creative in how they breach Microsoft Office. And although Microsoft releases security patches as soon as vulnerabilities are discovered, there’s a new hacking technique that allows cybercriminals to slip past traditional threat detection tools.

Mobile devices and healthcare businesses

Data security and compliance need to be high on the list of any healthcare organization's priorities. Do you have security measures in place to protect your patient data? Is your practice compliant with the HIPAA regulation? If you answered "no" to any of these questions, this article is a must-read.

Cisco to predict IT failures using AI

Mark Zuckerberg and Elon Musk are not the only ones dabbling with AI and machine learning. According to Cisco, these technologies might be key to the future of IT system management and business continuity, both of which have grown increasingly complex over the years.