Email White List and Safe Sender Guide

To better stay in touch via email, you should add vendors and special contacts to your “safe sender” list. This prevents important communications from ending up in your spam folder. For more information about how to do this using your email client, refer to the Whitelist Guide here. This will help ensure that email communications get delivered to you and are not diverted to your spam folder, avoiding necessary, informative and…

Read More

The National Do Not Call Registry

Gives you a choice about whether to receive telemarketing calls You can register your home or mobile phone for free.After you register, other types of organizations may still call you, such as charities, political groups, debt collectors and surveys. To learn more, read our FAQs.If you received an unwanted call after your number was on the National Registry for 31 days, report it to the FTC. For more options and information click…

Read More

AlternativeTo – Crowdsourced software recommendations

AlternativeTo lets you find new Windows, Mac, Linux, online and mobile software based on applications you already know instead of useless categories. AlternativeTo is a new approach to finding good software. Tell us what application you want to replace and we give you suggestions on great alternatives! Instead of listing thousands of more or less crappy applications in a category, we make each application into a category. Think of it…

Read More

FBI Recommendations on Business Email Compromise (BEC)

The menace of Business Email Compromise (BEC) is often overshadowed by ransomware but it’s something small and medium-sized businesses shouldn’t lose sight of. The FBI Internet Crime Complaint Center (IC3) has alerted US businesses to ongoing attacks targeting organizations using Microsoft Office 365 and Google G Suite. Warnings about BEC are specifically to those carried out against the two largest hosted email services, and the FBI believes that SMEs, with their limited IT…

Read More

New Android Malware Poses as Security Update to Take Control of Devices

The malware can record calls, take photos, and perform a variety of invasive actions. Before you approve what appears to be a new Android update, you may want to verify that you’re installing the real thing. According to mobile security firm Zimperium zLabs, a new form of malware disguised as a system update is making the rounds on Android devices. Instead of actually upgrading users to a new version of the operating system, the malware…

Read More
%d bloggers like this: