Tuesday Tip: Turn Your “Live” Photos into a Video

Here’s a little-known iPhone trick that can turn your Live Photos into a quick highlight reel, perfect for capturing those candid moments at family gatherings, office parties, or even that hilarious series of pet antics. Open your Photos app and tap on the Albums tab. Scroll down and find the “Live Photos” album; it’s where all those motion-filled snapshots live.…

Read More

Urgent Printer Security Alert

office working using printer

Thanks to Kardon for originally reporting on this issue. A newly reported security flaw could put your office printers, and your entire network, at risk. What’s Going On? Researchers at Rapid7 recently uncovered eight new security vulnerabilities affecting over 700 printer models, including 689 devices from Brother and 59 others from brands like Fujifilm, Toshiba Tec, Ricoh, and Konica Minolta. These…

Read More

Top 10 Tuesday Tips of 2024

As we look forward to an exciting new year, we wanted to take a moment to look back at the most popular Tuesday Tips from 2024 so you can read your favorites again and catch on any you missed. Our talented Network 1 team tackled a wide range of topics—from protecting yourself from hackers to…

Read More

Stop Texting? The FBI Says You Should.

Tales from Cyberland Stop Texting

Cybersecurity threats are escalating, and recent warnings from global intelligence agencies reveal a critical risk: major telecommunications providers have been compromised, exposing data to state-sponsored threat actors. How do we know this? First, in December 2024 the FBI, CIA, and cyber security agencies from Australia, Canada, and New Zealand published a notice warning the public…

Read More

The Scariest Threat Haunting Small Businesses This Halloween

scary image of ghosts and skulls

It’s that time of year when spooky costumes and haunted houses are all in good fun, but there’s something much scarier lurking in the shadows for small businesses—cybercrime. And unlike the fake ghouls and goblins of Halloween, the threats posed by hackers are very real. For greater Atlanta small and mid-sized businesses, cyberattacks are a…

Read More

Cybersecurity for Kids: A Guide for Parents

parents and children at computer

Today, teaching your children about online safety is as essential as teaching them to cross the street safely. This guide is designed to help you introduce key cybersecurity concepts to your children; to help them understand the importance of protecting themselves and the family’s personal data. Start with Basic Internet Safety It’s important to have…

Read More

Longer Passwords Are In, Frequent Changes Are Out

October is Cybersecurity Month, the perfect time for businesses to reassess their security practices, especially when it comes to passwords. The National Institute of Standards and Technology (NIST) recently updated its password guidelines, and these new recommendations mark a significant shift in how we think about passwords. Goodbye, Complex Passwords: Hello, Longer Passphrases In the…

Read More

Microsoft 365 Implements Changes to its Products’ Licensing

Teams and Office break up

Building on licensing updates for Europe last year, Microsoft is now extending those changes to Microsoft 365, Office 365, and Teams globally. The company’s goal is to ensure transparency and consistency for customers worldwide. In essence, as of April 1, 2024, Teams will no longer be a part of Office 365 E3, Office 365 E5,…

Read More

Medical Practitioners Hit Hard by UnitedHealth Group Cyberattack

Medical Data Breach word cloud on blue background

The cyberattack on Change Healthcare, owned by UnitedHealth Group, disrupted digital clearinghouse services, impacting billing and care authorization systems nationwide. On average Change Healthcare processes 15 billion health care transactions annually, managing one in three health care transactions in the US. UnitedHealth identified a ransomware group called ALPHV, or Blackcat, as responsible. The attack has…

Read More

How Pig Butchering Scams Work & How to Avoid Them

Pig in a pen

Pig butchering scams, a term that might sound odd and even gruesome in the context of cybercrime, are increasingly becoming a significant concern for individuals and businesses alike. More sophisticated than phishing or social engineering attempts, these scams are a long game to which many savvy people have fallen prey. In fact, the Homeland Security…

Read More

Tuesday Tip: Search Within WhatsApp

Young woman using cell phone to send text message on social network at night. Closeup of hands with computer laptop in background

No matter what platform you use, messages accumulate over time, and it can be hard to find what you need, when you need it. Maybe you’re looking for the street address of a restaurant you want to try or that funny quote your sister sent to you. For those that use WhatsApp, there is an…

Read More

Tuesday Tip: Who Needs a New iPhone?

image of 2 iPhones

Did you know Apple has an iPhone upgrade plan? This was news to me. This plan is perfect for anyone who always wants the most recent iPhone and can afford it. I am sure my best friend has this plan as he has the new everything when it comes to technology! The first step is…

Read More

Tuesday Tip: FlightAware

Bottom view on jet airplane flying in the sky overhead among green trees, carbon footprint

If you’ve ever looked up at an airplane and wondered where it could be headed, well, wonder no more. With the power of the internet at your fingertips, you can view details on just about any airplane you see in the sky on FlightAware. With nearly-real-time tracking, you can view an interactive map of your…

Read More