Microsoft Cortana, Your New Personal Assistant

We all could use a little help in remembering our tasks from time to time. In the busy world we live in, it can be challenging to keep up with our day-to-day duties, and many times, emails and tasks out of the ordinary get lost. In a perfect world, we would all have an assistant that briefs us on our day and reminds us of tasks that may have been forgotten. Fortunately, Microsoft understands that most of us are not privileged enough to have a personal assistant, and instead, they created a virtual assistant for all of us. Introducing, Cortana Briefing Emails. 

Read more

How Did 2020 Change The Way We Work?

 

In March of 2020, work as we knew it instantly changed. We were used to an office environment where physical office space was the norm. Virtual meetings were the exception and were primarily used when clients were distant and travel was impossible. Although more and more companies had made working virtually more acceptable, the trend was merely beginning. The global pandemic of COVID-19 changed all of this. Many will look back on this year and remember it as a disaster. However, because of the challenging world pandemic, technology quickly evolved and was adopted faster than would have ever happened.

Read more

What's On Our Minds? "Hit Refresh" by Satya Nadella

 

This year, more than any other, many of us have wished we could hit the "refresh" button and go back to our original factory settings. Many times, life gets away from us, and we yearn for the way things used to be. This thought process is the emphasis behind Satya Nadella's book, "Hit Refresh." Getting back to how things used to be was the approach Microsoft CEO Satya Nadella took to build Microsoft back up to be a true leader in innovation. Pendello President, Mike Jackson, recently read this book, and the takeaways were enlightening. Today, we're taking a look at what this book represents in today's workplace.

Read more

Multifactor Authentication: What type is best?

In regards to Multifactor Authentication, the question should not be if but instead what kind. Multifactor authentication (MFA) is vital to the security of your network. As Brian Sherman from Valeo was quoted, “Weaker MFA is better than no MFA.” However, if you can protect your data more thoroughly, then why wouldn’t you? Let’s take a look at the forms of MFA and how they will help keep your data safe.

Read more

Here Phishy Phishy

Top 2020 Phishing Threats and How to Dodge Them

2020 has been quite a year thus far. Alongside record alcohol sales, Cybercrimes are also at an all-time high. As we have discussed in the past, 91% of breaches begin with a phishing attempt, and we have seen phishing attempts increase by 600% since January. To avoid these tricky phishing schemes, we need to understand what to be vigilant of when it comes to phishing attempts. We know that COVID-19 phishing attacks are on the rise but don't get too complacent in that fact. Let's take a look at the top trending phishing attacks in 2020.

Read more

The Worm That Started It All

 

Cybersecurity is a term we discuss broadly. It was discovered in 2019 that the average sophisticated cyberattack costs an organization $13million. With this extreme financial consequence, you can understand why we focus on cybersecurity education and prevention. We know the dangers of cyberattacks, although are you aware of what started the Cybersecurity Industry? This week we hit the thirty-second anniversary of the first sophisticated computer worm. How did this "research project" meant to determine the Internet's size end up taking down 10% of the Internet within 24 hours?

Read more

Your Credentials Are Exposed. Now What?

With the fact that 158 accounts are hacked every second on average, businesses need to be versed in what to do when you receive the alert that your or employee's credentials have been compromised. It is an unfortunate reality that once exposed on the Dark Web, your information cannot ever be completely removed or hidden. You cannot file a complaint or contact a support line to demand your data be removed. Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data. We must identify, understand, and learn from past mistakes or failures, and adopt a more proactive and preventative approach to your business' cybersecurity strategies moving forward.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company