Beyond the blue screen of death: Why software updates matter

The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them. In the realm of computing, few things are as unsettling as encountering a blue screen of death (BSOD) on your Windows system. The ominous screen with its cryptic error messages evokes a … More Beyond the blue screen of death: Why software updates matter

Got a new device? 7 things to do before disposing of your old tech

Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information. The planet is warming and we’re all becoming more environmentally aware. When it comes to IT, this manifests in a surge in “e-waste” recycling. It could be anything from a laptop or desktop computer to a … More Got a new device? 7 things to do before disposing of your old tech

Say what you will? Your favorite speech-to-text app may be a privacy risk

Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. Software that swiftly and effortlessly converts spoken words into written text has been a boon for many of us. Its capabilities come in handy in various situations; for example, they can save us from … More Say what you will? Your favorite speech-to-text app may be a privacy risk

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

The campaign started with a trojanized version of unsupported financial software. The compromise of the 3CX communication software made history as the first-ever publicly documented incident of one supply-chain attack leading to another. Two critical infrastructure organizations in the energy sector and two organizations in the financial sector are among the confirmed victims.  A supply-chain attack attempts to evade cybersecurity … More Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?