Purplo

Your MacOS Is Under Attack: 2019’s Biggest Malware Threats

Your MacOS Is Under Attack: 2019’s Biggest Malware Threats The Mac operating system (MacOs) has frequently been hailed as one of the best systems for its resiliency to malware and typical viruses. But the days of MacOs standing strong and tall with no worries have really always been a misconception. Mac systems are just as […]

How Can You Encrypt Files and Folders in Windows 10, 8 or 7?

How Can You Encrypt Files and Folders in Windows 10, 8 or 7? You can encrypt files and folders in Windows (vers. 7-10) using BitLocker. This Vista operating system extension has on-disk encryption as well as key management capability. It’s protected by two-factor authentication, so anyone who wants to crack the code needs a hardware […]

Habits You Want From Your Technology Partner

Habits You Want From Your Technology Partner When you are running a business, you want your technology to integrate well with the other tech you use in your business and with your overall IT platform. When you run into situations where your tech fails to integrate well, it can cause serious problems—leading to lost productivity, […]

Building a Rock Solid Cybersecurity Plan

Cybercriminals may be going into a stealth mode, but that doesn’t mean that cyberattacks are slowing down — quite the opposite, in fact. According to the 2018 SiteLock Website Security Report, attacks increased by 59% and accelerated going into December. Record numbers of businesses are being infiltrated by hostile actors, with data breaches affecting hundreds of millions of users […]

Old School Meetings Revisited

You know running a successful business requires much more than just offering a great product or service. It takes constant engagement and collaboration of all of your employees to produce the best results, and it takes your best effort to remain competitive in a crowded marketplace. Collaboration between employees used to mean lots of daily […]

Important Security News About Mac & Zoom

Did you know that your Macintosh webcam could have been hijacked? A serious security flaw in the Zoom video conferencing application joined Mac users to video calls without their permission. Zoom has now released a fix – click here. A vulnerability in the MacZoom client allowed malicious websites to enable Mac cameras without users’ permissions. […]

How to Password Protect an App on Your Android Device

Have you ever wanted to put access to certain apps on your phone or tablet under an extra layer of security? There are all sorts of reasons people might want this. Maybe you want to share your phone with a child, but you don’t want little Johnny messing with work apps or your grown-up Netflix […]

How to Keep Your Business Safe From the Dark Web

Assassins for hire, drugs by mail order, and fake passports: What do all these things have in common? You can find them all on the dark web. “Okay …” you may be thinking, “Sounds like a blast — but how does this affect me and my business?” Well, most likely, you’re not surfing the dark web for […]

How To Remove Microsoft Office Metadata?

This article covers the definition of metadata and how to view, manage and delete it in Microsoft applications. What is Metadata? Metadata is information about your data. It contains facts that can’t be disputed, the same way data does. Here is an example from Microsoft Word. Let’s say you’re writing a letter to a co-worker. […]

What Is The Fake DHS Phishing Email Going Around?

How Can You and Your Employees Avoid It? The Cybersecurity and Infrastructure Security Agency (CISA) is warning about an email phishing scam that tricks users into clicking on malicious attachments that look like legitimate Department of Homeland Security (DHS) notifications. The email campaign uses a spoofed email address to appear like a National Cyber Awareness […]