The 360IT Blog

360IT Partners’ print and electronic newsletters, archived here for your convenience

Business

What to do in case of a website breach

Big companies like Yahoo, Target, and AOL are often at risk of data breaches because of the large volume of data they collect and store. And when a data breach occurs, individual users are the ones hardest hit. Luckily, there are a few things you can do to mitigate damage from disastrous data breaches. Determine

Read More »
Virtualization

Situations perfect for virtual desktops

Managing an office full of computers and mobile devices is a nightmare especially in regulated industries. But with a virtualized desktop infrastructure (VDI), employees can access all the features of a personal computer from almost any mobile device. Here are a few use cases for this emerging technology: Healthcare In an industry where every file

Read More »
Security

SMB routers targeted by VPNFilter malware

Earlier this year, news broke that a malware strain named VPNFilter was infecting hundreds of thousands of devices. If you didn’t act then, now’s the time. Security experts have updated their threat assessment and its much worse than they originally thought. Small businesses are especially at risk and need to take action. VPNFilter recap A

Read More »
Apple

Apple WWDC 2018: News and updates

The Worldwide Developers Conference (WWDC) has developers meeting and joining discussions with more than a thousand engineers from Apple. What new products did the computer manufacturer have in store for consumers? Read on to find out! A more personal, faster iOS 12 Apple has focused on improving the operating system’s performance so that iPads and

Read More »
Business

Hide & Seek malware: What you need to know

What’s the worst thing that could happen to your Internet of Things (IoT) devices? If you guessed ‘getting infected with malware,’ you’re right. Many users think IoT gadgets don’t need the same protections required for PCs, laptops, and smartphones — but they do. There’s a new malware strain that attacks IoT-enabled devices, and you need

Read More »
Google

Chrome: From HTTP to HTTPS

Within the last year, Chrome has helped users understand that HTTP sites are not secure. More websites use HTTPS, a safer protocol, than ever before. So, how can you benefit from this transition? Find out here. For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure

Read More »
Business

The dangers of app overload in businesses

Blessed are today’s businesses for having the benefits of technology to make operation more efficient. Apps have been a big help in streamlining business processes across industries. But at the same time, these programs may cause error and confusion when unorganized — and that translates into lowered productivity. How app confusion occurs A new study

Read More »
Social Media

Facebook: 4th favorite choice for teens

Facebook is no longer the most popular social media platform for US teens. According to a recent survey by Pew Research Center, only 51% of US teens aged 13 to 17 years are using Facebook. This is much lower than the shares for US teenage Snapchat users (69%), Instagram users (72%), and YouTube users (85%).

Read More »
Virtualization

Virtualization: Common misconceptions

Small businesses can accomplish a lot by implementing virtualization technology on their office IT network. Unfortunately, many SMBs shy away from it because of some common misconceptions. If you fall into that category, there are at least four myths you should stop believing. Myth #1 – Virtualization is too expensive for SMBs Many people assume

Read More »
Office

Office 365 will block Flash by 2019

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good. What media

Read More »
Healthcare

Mitigating healthcare insider threats

The healthcare industry is unique in that the biggest data security threat comes from insider breaches.The main reason for these unauthorized hacks is financial gain. So how can healthcare organizations protect themselves against insider threats? Read on. #1 Educate – The workforce (meaning all healthcare employees) must be educated on allowable uses and disclosures of

Read More »
Security

Nation-state hackers inflict destructive malware

A destructive, new malware has surfaced in at least 500,000 home and business routers across 54 countries. Security researchers warned that the infected devices could “self-destruct” as the said malware named VPNFilter can maintain presence even after a successful reboot. How VPNFilter Works Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and TP-Link networking

Read More »
Scroll to Top