21 Feb 2020

How scammers launch phishing attacks via VoIP

2020-02-21T08:00:05-07:00

In a vishing scam, scammers may pretend to be a bank representative, a government official, or any type of legitimate entity requesting confidential information via Voice over Internet Protocol (VoIP) platforms. With expanding avenues of cyberattacks, remaining vigilant is more important than ever. Learn why vishing campaigns are effective.

VoIP makes it easy to create fake numbers

More cybercriminals are launching vishing scams because it’s easy for them to hide their tracks and the risk of getting detected is minimal.

Using a fake number, scammers can contact your employees, pretend to be a representative of a bank or government agency, ask for sensitive information — such as salary information, account numbers, and company intellectual property — and get away with it. Scammers can also manipulate local numbers to emulate multinational banks, which they will then use for various VoIP scams.

VoIP is easy to set up and difficult to track

It isn’t difficult to configure a VoIP system, which makes it easy to make fraudulent phone calls or messages. Scammers only need to […]

How scammers launch phishing attacks via VoIP2020-02-21T08:00:05-07:00
19 Feb 2020

Using Workplace Analytics to boost productivity

2020-03-30T14:25:55-07:00

Microsoft’s Workplace Analytics uses data gathered from email, documents, calendar, and other Office 365 applications to present a clear picture of both employee and manager productivity. It’s a clear upgrade from MyAnalytics, which allowed employees to view just their own data.

How does Workplace Analytics work?

A paid add-on to Office 365 enterprise plans, Workplace Analytics extracts behavioral insights from data gathered from Office 365 email, calendar, documents, and Skype. This means any data an employee types into their email and calendar — whether the information is in the subject line or in the body itself — can be used to determine their productivity.

The program has an overview dashboard that provides specific information:

  • Week in the Life provides an overall view of how the entire organization spends time and how members collaborate with one another
  • Meetings Overview shows the amount of time people spent in meetings
  • Management and Coaching gauges one-on-one meetings between your staff and their manager
  • Internal Networks shows how people within the company connect with one […]
Using Workplace Analytics to boost productivity2020-03-30T14:25:55-07:00
18 Feb 2020

Guide to Creating a BYOD Policy for Small Business

2020-03-30T14:25:42-07:00

Do you want to give your employees the freedom to work from anywhere, but aren't sure where to start in terms of securing company data on their personal devices? Check out this article to learn more about how to protect your company data across all devices. At GeeksHD, we can help protect your company data, no matter where it's accessed from. Contact our team to learn more.

Guide to Creating a BYOD Policy for Small Business2020-03-30T14:25:42-07:00
18 Feb 2020

Day in the life of a GDPR-ready DPO

2020-02-18T10:37:07-07:00

What does a day in the life of a GDPR-ready DPO look like? This infographic walks you through a scenario showing how Microsoft 365 controls keep data safe and help organizations more easily comply with GDPR requirements.

Day in the life of a GDPR-ready DPO2020-02-18T10:37:07-07:00
18 Feb 2020

Customer story: Garner Foods

2020-03-30T14:25:36-07:00

Although Garner Foods is based in South Carolina, they sell their products all over the world. With digital tools, their projects are easily managed remotely, and team members can work from anywhere. With help from Microsoft Business, Garner Foods remains a fourth-generation family business while becoming a world-class operation in terms of IT infrastructure. And with enterprise-grade #security across all company- and employee-owned devices, company information is always secure. Contact us at GeeksHD to learn what else you can do with our #Microsoft solutions!

Customer story: Garner Foods2020-03-30T14:25:36-07:00
17 Feb 2020

Here’s how to speed up Google Chrome

2020-02-18T08:33:02-07:00

Google made its foray into web browsers with Chrome in 2008. With its remarkable speed and ease, Chrome was welcomed by many users. However, over time, the browser becomes a bit sluggish, especially if you’ve installed extras such as extensions. Follow these easy steps to ramp up your Chrome browser’s speed.

Clear your browsing data

Chrome stores cached copies of websites you visit so it can load the page faster when you visit them again. It also keeps a database of your browsing history and cookies for the same purpose. As you visit more and more websites, these pieces of data accumulate in Chrome and can slow the browser down.

Thankfully, the solution is easy: clear your cache. Simply access your browsing history by entering chrome://history in your address bar. From the left panel, select Clear browsing data. Choose which data to delete by clicking on the checkboxes of all items you want deleted, like cached images or cookies. You can also select the time range that will be affected […]

Here’s how to speed up Google Chrome2020-02-18T08:33:02-07:00
14 Feb 2020

Benefits of technology business reviews

2020-02-18T08:33:21-07:00

Most small- to medium-sized businesses (SMBs) don’t possess the resources to run and maintain their IT infrastructure, let alone assess whether it’s still driving value for the company. However, if you want to ensure everything is running smoothly, it’s important to conduct technology business reviews whenever possible.

A technology business review reveals the strengths and weaknesses of your company’s IT framework. It’s often performed by a third-party IT consultant who will give an objective assessment of your technology and provide recommendations to help you meet your goals. If done properly, technology business reviews allow you to:

Save money

Every review starts with a cost-benefit analysis to determine whether an implemented solution is worth the continued investment. If there are technologies costing you a fortune in management and maintenance fees, consultants will advise you to cut them from your budget. The best ones will recommend cost-effective alternatives so you can do more with less.

Increase productivity

System-wide reviews of your IT infrastructure show you what processes are hindering business operations. This allows you […]

Benefits of technology business reviews2020-02-18T08:33:21-07:00
12 Feb 2020

What is bloatware, and how can you remove it?

2020-02-18T08:34:45-07:00

Bloatware is software that nobody asked for but is on your computer, taking up valuable space. These software apps come with your hardware pre-installed, and very often, it isn’t always apparent how to delete them properly.

Superfish

In mid-2014, Lenovo users noticed that something was awry with their web browsers: banner ads were breaking webpage layouts and pop-ups were making surfing unpleasant. A deep dive into the problem led to the discovery of pre-installed software called Superfish — malware in the form of an adware pusher. 

The app caused an uproar not only because of its disruptive ads, but also because it was found that Lenovo had essentially interrupted what’s known in the industry as the certificate chain — a chain of trust whereby companies that run machines that users visit as they traverse the internet provide certificates that prove they’re a legitimate party. With Superfish, Lenovo allegedly used self-signed certificates — as Lenovo is a known and trusted […]

What is bloatware, and how can you remove it?2020-02-18T08:34:45-07:00
11 Feb 2020

Protect your business: Recognize the top three security threats, plus one you may not know about

2020-02-11T10:24:42-07:00

Security threats take many forms. You may know about the three most common types of cyberattacks (viruses, phishing, and ransomware), but do you know about the internal security threats your company faces? Awareness is the first step in security and prevention. If you're unsure of how to protect your company from cyberattacks, we can help. Check out this e-book and give us a call to get started.

Protect your business: Recognize the top three security threats, plus one you may not know about2020-02-11T10:24:42-07:00
Go to Top