hero_2.jpg

GS Blog

Rapid technological advances have altered the landscape of business IT operations considerably in recent years. This is both good news and bad news for non-technical business owners who find themselves struggling to stay on top of all the latest developments, including the deluge of software updates, security updates, and other essentials. If you're one of those beleaguered decision makers, you may have heard of two outsourced solutions that can save you a lot of effort and confusion – software as a service (SaaS) and managed services. But if you're weighing one against the other for your organization, there are important differences between the two that you need to understand.

 

The United States Computer Emergency Readiness Team issued an alert today for a vulnerability on Apple iOS devices (iPhones, iPads) that has the potential to affect many users.  The attack, called “Masque Attack”,  allows an attacker to substitute malware for a legitimate iOS app.  Basically, the attack compromises a website you may visit from your phone or tablet and then pops up a window asking you to install an app to more easily use the site.  If you chose to install the app, it replaces the real app with a fake one that may actually work, but also steals your credentials and sends them to the attacker. 

In this edition of the Common IT Questions blog series, we discuss an enhanced function of the iPhone.  Smart phones have become an everyday fixture in the office these days.  Business owners will surely have more questions on how to best use their features to increase business productivity.