Leave no room for hackers to operate

For most people, social media is a convenient way to stay in touch with family and friends. For a small group of people, it’s an opportunity to profit off other people’s trust. Here are some things you can do to continue enjoying Facebook and Twitter without compromising your privacy.

How to optimize Office 365

Out of the hundreds of Office 365 tools available to you, you’re probably using only 10-15% of them. This could be due to a lack of training or an unfamiliarity with some of the advanced options available in Word and Excel. But it’s easy to optimize your Office 365 investment by learning more about the following communication and collaboration features.

When Pre-installed Apps Create Risks

Bloatware is generally considered harmless, but what about when these unnecessary apps turn into a security risk? A recent report shows that a pre-installed app in some versions of Windows 10 had an alarming plugin flaw:

Tavis Ormandy, a researcher from Google's Project Zero, recently discovered that a compromised password management app, Keeper, had been installed with some versions of Windows 10. For a brief period, Keeper's browser extension, when enabled, allowed websites to easily steal login credentials.

Citrix integrates with Google Cloud

With feature-rich cloud applications like Docs and Slides in G Suite, users can work whenever and wherever they want from any internet-connected device. To help businesses get more out of their cloud platform, Google announced that they are working with Citrix to run virtual desktops and applications in a cloud-hosted environment.