Technology News

Today’s News Regarding Business Technology and Cyber Security

Stay updated on what’s happening with business technology, IT, and cyber security with the experts at Dox. We sift through all of the day’s technology news and share what is most relevant to help businesses like yours from the most trusted sources.

Whether you want to know about the newest developments in business mobility and virtualization to IT support and intrusion prevention systems (IPS), Dox will keep you apprised. New software, hardware, and applications are rolling out from trusted brands such as Microsoft, Citrix, and Aruba every day to help businesses do even better so stay on top of what’s out there to better your business.

With technology news from Dox, you will be in the know when it comes to security threats and how to protect your business. Whether it’s a new computer virus or a spear phishing scam aimed at employees, our security news helps protect your privacy and prevent security breaches by giving you the information you need. Know what’s happening with everything in cybersecurity from security information and event management (SIEM) to protecting your clients’ personally identifiable information (PII).

Technology News

Citrix holds high hopes for Brazil

Citrix holds high hopes for Brazil

The company expects a threefold increase in sales for 2018; devises plan to boost cloud-focused training for resellers.

By Angelica Mari for Brazil Tech

Citrix will ramp up channel training in Brazil to support its goal to achieve threefold growth in local sales in 2018. The company's current bullish moment in Brazil follows a slowdown that lasted for nearly three years, according to the country director at Citrix Brazil, Luis Banhara.

6 Microsoft Teams tips

6 Microsoft Teams tips

Despite being late to the group chat scene, Microsoft Teams is equipped with a handful of features and impressive integration that set it apart from its competitors. So if you’re already subscribed to Office 365, here’s how you can take Teams to the next level.

Phishers use encrypted sites to scam

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.

A keylogger found in HP laptops

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear from it.

Gmail gets more add-ons!

Gmail gets more add-ons!

Add-ons and swim rings share one thing in common — they both can save your life! While it might not be literal in the case of the former, add-ons do heaps to streamline your everyday tasks and literally save you hours of work. If you use Gmail, you can experience it today!

Google’s focus is on productivity services that are already connected to email systems one way or another.

Kaspersky Lab Sues U.S. Government Over Software Ban

Kaspersky Lab Sues U.S. Government Over Software Ban

By Swati Khandelwal, The Hacker News

Moscow-based cyber security firm Kaspersky Lab has taken the United States government to a U.S. federal court for its decision to ban the use of Kaspersky products in federal agencies and departments.

In September 2017, the United States Department of Homeland Security (DHS) issued a Binding Operational Directive (BOD) ordering civilian government agencies to remove Kaspersky Lab software from their computers and networks within 90 days.

Identity and Access Management 101

Identity and Access Management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer.

5 Types of virtualization

5 Types of virtualization

The age-old proverb “There’s more than one way to skin a cat” is especially relevant when budgeting for IT services. With the right technology consulting and support, any business can afford customized solutions that employ creative methods to achieve its end goals.

Facebook Messenger: What’s New?

Facebook Messenger: What’s New?

Over 330 million consumers connected with small businesses via Facebook Messenger in 2017 alone, so it’s evident that the ‘phone call’ era is coming to a close. Since consumers now want constant, immediate online connectivity with their local car dealership, pizza joint, and other local businesses, it is only fitting that Facebook Messenger’s latest feature grants consumers even more flexibility in how they contact their local business.