Microsoft Security: Common Security Threats

Microsoft Security: Common Security Threats

Common Security Threats and How Microsoft Security Helps Mitigate Them Advanced modern technologies such as cloud computing and virtualization have completely revolutionized the workforce. Remote working arrangements have now become increasingly commonplace. Along with this advancement is an expanded network footprint characterized by myriads of virtualized workloads. This includes personal devices and computers that represent […]

read more
Stopping Cyber Threats In Small Business (Training/Education)

Stopping Cyber Threats In Small Business (Training/Education)

Best Way to Improve Cybersecurity? Train Your Employees! Why an informed team is your organizations best defense against cybercriminals Cyber attacks and data loss are the last thing any organization wants to fall victim to. In an increasingly digital workforce, companies are investing in all kinds of cybersecurity efforts to ensure the bad guys can’t […]

read more
Did You Know? Your DNA Can Be Hacked!

Did You Know? Your DNA Can Be Hacked!

Cyber Hacks on DNA-Testing Companies Raise Fears about Genetic Data Privacy   DNA-testing companies the latest to be targeted by cybercriminals Stories of businesses getting hacked by cybercriminals are pretty much par for the course nowadays. Increasingly, companies who collect and store large amounts of user data are prime targets for malicious and greedy hackers. […]

read more
Recovery from Ransomware Attack Costing Atlanta Millions

Recovery from Ransomware Attack Costing Atlanta Millions

Cyberattacks in Atlanta likely to be the most damaging in US municipal history It was only this past March that the city of Atlanta was hit by a massive ransomware attack. However, city officials are claiming an additional $9.5 million dollars is required for the ongoing recovery effort. As the city struggles to restore normal […]

read more
Franson Civil Engineering Looks Back on Nexus’ 20 Years

Franson Civil Engineering Looks Back on Nexus’ 20 Years

Valued clients like Franson Civil Engineers offer a unique perspective on what has really helped us excel in business for two decades now. It's not just about the service we offer or the technologies we use – it's about the quality of our customer service and the commitment we have made to those we work with. 

read more
How to Use Keyboard Shortcuts in Quickbooks Pro

How to Use Keyboard Shortcuts in Quickbooks Pro

Quickbooks offers users at every level, an enterprise-grade accounting program to track income and expenses. This software package was designed to enable businesses to track financial expenditures and income with the level of detail necessary for complete control of company finances. It is somewhat like a soft copy of accounting book. Some people may find […]

read more
Hackers Shortcut Microsoft Office 365 Security

Hackers Shortcut Microsoft Office 365 Security

Hackers Discover New Way to Bypass Microsoft’s Office 365 Security Protocols Hackers have discovered an innovative method of getting those malicious URLs in their emails past Office 365’s security protocols. This was first revealed by Avanan, a company that deals in internet security. Avanan says that cybercriminals are now using a tag in the HTML […]

read more
How To Avoid The Pitfalls Hackers Deploy

How To Avoid The Pitfalls Hackers Deploy

We hear about hacking in the news all the time. Equifax, Home Depot, Target, Uber, Twitter and more. If you think your small or medium-sized business isn’t a large enough target, you’re wrong. SMBs are the fastest-growing hacking sector today.

read more
Hmmmmm…What Is Yam Jam?

Hmmmmm…What Is Yam Jam?

Yam Jam – The Virtual Town Hall Experience That Brings Your Organization Together If you are an avid user of Office 365 or have in some way expressed interest in Microsoft’s online environment, then you’re probably familiar with Yammer – the freemium enterprise social networking service that is used for private communication within organizations. Also, […]

read more
Sensitive Data Stolen From Naval Contractor By Chinese Hackers

Sensitive Data Stolen From Naval Contractor By Chinese Hackers

Officials recently revealed that a data breach occurred involving a Navy Contractor where hackers working for the Chinese government gained access to highly sensitive data regarding submarine warfare. Included in the breach were top secret plans for the design of a supersonic anti-ship missile system that was to be used in U.S. submarines by the […]

read more
Psst… Do You Want to Know a Secret?

Psst… Do You Want to Know a Secret?

Amazon’s Alexa Has Some Answers to Questions You Probably Don’t Even Know to Ask. Alexa is a top-selling gadget for Amazon, and the list of things it can do is ever increasing. Most people who use Amazon Alexa ask the same things over and over -but this virtual assistant can answer a lot of questions […]

read more
Northcentral Technical College in Wisconsin Targeted by Cyber Thieves

Northcentral Technical College in Wisconsin Targeted by Cyber Thieves

Northcentral Technical College (NTC) in Wisconsin has experienced a crippling cyber attack that shut down most of its classes from Monday through Wednesday. The cyber attack triggered system outages all over the school causing school officials to issue a public notice on the homepage of the college website that read: “We apologize for the inconvenience but […]

read more