Tech News

AI in CyberSecurity: Good or Bad

You can use artificial intelligence (AI) to automate complex repetitive tasks much faster than a human. AI technology can sort complex, repetitive input logically. That’s why AI is used for facial recognition and self-driving cars. But this ability also paved the way for AI cybersecurity. This is especially helpful in assessing threats in complex organizations. When business structures are continually […]

Credential Theft and How can you prevent it

Cybercriminals conduct credential harvesting for many reasons. They may be looking for your network’s location. They may also want to commit fraud. A 2017 Verizon report stated that over 80% of cybercrime was a result of stolen passwords! This trend of stealing credentials is on the rise.     A lack of jobs for highly qualified IT literate personnel has led […]

Data Leak: What and How to Prevent

A data leak is an unauthorized data transfer from within a company to a third party. Individuals, companies, and government agencies experience financial and reputational loss if unauthorized parties get access to their sensitive data. All businesses benefit from monitoring cybersecurity risks and taking appropriate steps to prevent data loss and theft. In this article, […]

Your Complete Guide to Digital Workplace Solutions

A digital workplace is a virtual platform designed to streamline everyday work and improve employees’ efficiency, collaboration, and morale. It’s a central hub that extends the physical office workspace and allows employees to work without being bound to a single location. Employees use digital workplace technologies to streamline business operations, communicate securely, and share ideas […]

VMs vs Containers : Which should you Pick

If you’re looking to improve computer performance, the list narrows down to two notable inventions: virtualization and containerization. Both methods have allowed IT professionals to benefit from the physical hardware running on a server. The goal is to use the same resources but run different operating systems. The question I’ll be answering in this article is: which […]

RansomWare : BlackByte

BlackByte is a ransomware family that has been building a name for itself since 2021. Like its contemporaries, it has gone after critical infrastructure for a higher chance of a getting a payout. Blackbyte Initial versions used symmetric keys, it has multiple variants, archives files using WinRAR, uses trojanized legitimate tools, and involves phishing emails […]

Tips and Tutorials

A good way to get your head around any technology area is to begin by reading a well-crafted article on the subject that starts with “What is…?” Here are a few of our favorite what-is guides from our TechGenix website: What Is Network Orchestration? What Is Virtualization-Based Security (VBS)? What Is Network Segmentation? What Is a Digital […]

Windows Tips and Tricks

How to Deploy Windows 10 (11) with PXE Network Boot? (Windows OS Hub) How to Create a Wi-Fi Hotspot on your Windows PC? (Windows OS Hub) How to Repair EFI/GPT Bootloader on Windows 10 or 11? (Windows OS Hub) How to replace your Windows 11 Start menu with a third-party app (ZDNet) How to install Microsoft Store apps and […]

Tips and Tutorial

Let’s mix things up a bit this week, just for fun. Here goes! Enable BitLocker Silently using Autopilot and Intune (TechNuggets) How to Install and Uninstall KernelCare (Linux Journal) 5 Firewall Best Practices Every Business Should Implement (TechGenix) Tips for Overcoming Hybrid Cloud Disaster Recovery Challenges (DataCenter Knowledge) How to install and edit desktop files […]

Windows News

BetaNews tells us that Microsoft is bringing an “amazing new Privacy Auditing feature to Windows 11“. The new feature which is called Privacy Auditing will inform you about which apps have accessed sensitive devices like your camera or microphone, and also when they accessed those devices. Another new feature that Microsoft is working on for […]

Tips and Tutorials

A bunch of PowerShell tips and tutorials: PowerShell First-Timers (The Lonely Administrator) Top PowerShell commands you just have to try (onMSFT) PowerShell Profile Files: Getting Started (Windows OS Hub) Using PowerShell to manage password resets in Windows domains (BleepingComputer) How To Use a For Each Loop in PowerShell (ITProToday) Update all PowerShell Modules with one […]

Windows news

Nothing much of interest to us regarding Windows unless you like tabs in File Explorer or spend a lot of time working with Notepad (BetaNews). Neither of these improvements interest us much so time to move on. Wait just a minute! If you’ve been in a panic over the Follina Windows zero-day vulnerability, you’ll be […]

Upcoming webcasts, events and conferences..

Got an event, conference or webcast you want announced in our newsletter? Email us! June 8 – Live Demo: Ridiculously Easy Security Awareness Training and Phishing (KnowBe4) June 8 – Webcast: Threat Spotlight: Cloud-Native Ransomware (SANS) June 9 – Webinar: Tools for Better Network Monitoring and Observability(NetworkComputing) June 21-23 – Data Center Week, a 3-day online event produced by Endeavor Business Media’s […]

Scroll to top