Hexafusion Blog

Hexafusion has been serving the British Columbia area since 2017, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Helpful Features Found in Google Docs

Helpful Features Found in Google Docs

Within Google Workspace is Google Docs, a useful word processing solution that can be accessed through your web browser. In case you’re new to using Google’s productivity software, we have decided to assemble a short introduction to some of Google Docs’ most useful tools and features.

0 Comments
Continue reading

How to Use Google Drive to the Fullest

How to Use Google Drive to the Fullest

For the business seeking out a comprehensive cloud-based content management and collaboration solution, Google Drive is an option that warrants serious consideration. While we don’t want to recommend it over another one of your options, per se, we did want to provide a brief beginner’s guide to putting it to use. That way, any business that does elect to adopt Google Drive—and the associated solutions it comes with—has more information going in.

0 Comments
Continue reading

Worried About Losing Your Technology While Working Remotely?

Worried About Losing Your Technology While Working Remotely?

Remote work has been on the rise for some time, even before the COVID-19 pandemic made it the safest way for a business to operate. Naturally, this makes organization a particularly crucial thing to consider, especially as public areas reopen as workspace options.

0 Comments
Continue reading

Can You Save Money from Going Paperless?

Can You Save Money from Going Paperless?

Everyone knows that printing is costly. They come from nearly every direction: paper, ink, machines that seemingly always need some type of maintenance, the list of costs goes on and on. Some businesses, looking to get away from rising printing costs, and from paper files in general, are starting to do their best to eliminate printing and filing costs. Let’s take a brief look at how going paperless can save your organization money in the long run.

0 Comments
Continue reading

Let’s Look at a Few Collaboration-Themed Applications

Let’s Look at a Few Collaboration-Themed Applications

Boosting collaboration is a central theme to many companies' operational strategies. The more that people can do as a team, the less costly operations have to be. That is a sound business strategy. Today, many businesses are looking to software to build a successful collaborative situation. Let’s take a look at three such apps that, if used properly, will help any business boost their team’s ability to work together. 

0 Comments
Continue reading

Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips

intel-malware-detection-cybereason

Intel and Cybereason have partnered to build anti-ransomware defenses into the chipmaker's newly announced 11th generation Core vPro business-class processors.

The hardware-based security enhancements are baked into Intel's vPro platform via its Hardware Shield and Threat Detection Technology (TDT), enabling profiling and detection of ransomware and other threats that have an impact on the CPU performance.

0 Comments
Continue reading

Hackers Leak Stolen Pfizer-BioNTech COVID-19 Vaccine Data

covid-pharma-mobile-attack

On the heels of a cyberattack on the EMA, cybercriminals have now leaked Pfizer and BioNTech COVID-19 vaccine data on the internet.

On the heels of a previously-reported cyberattack on the European Medicines Agency (EMA), cybercriminals have spilled compromised data related to COVID-19 vaccinations onto the internet.

0 Comments
Continue reading

Data Breach at ‘Resident Evil’ Gaming Company Widens

resident-evil_capcom_data_breach

Capcom, the game developer behind Resident Evil, Street Fighter and Dark Stalkers, now says its recent attack compromised the personal data of up to 400,000 gamers.

A ransomware attack launched against gaming company Capcom last November keeps getting worse. The company now says that the personal data of up to 400,000 of its customers was compromised in the attack — 40,000 more than the company originally thought.

0 Comments
Continue reading

Hackers Steal Mimecast Certificate Used to Securely Connect with Microsoft 365

mimecast-certificate-office-365-

Mimecast said on Tuesday that "a sophisticated threat actor" had compromised a digital certificate it provided to certain customers to securely connect its products to Microsoft 365 (M365) Exchange.

The discovery was made after the breach was notified by Microsoft, the London-based company said in an alert posted on its website, adding it's reached out to the impacted organizations to remediate the issue.

0 Comments
Continue reading

Critical Microsoft Defender Bug Actively Exploited; Patch Tuesday Offers 83 Fixes

Microsoft-patch-tuesday-end

The first Patch Tuesday security bulletin for 2021 from Microsoft includes fixes for one bug under active attack, possibly linked to the massive SolarWinds hacks.

Microsoft addressed 10 critical bugs, one under active exploit and another publicly known, in its January Patch Tuesday roundup of fixes. In total it patched 83 vulnerabilities.

0 Comments
Continue reading

Tip of the Week: Lesser-Known Google Play Features

Tip of the Week: Lesser-Known Google Play Features

Android device users rely on the Google Play Store to source applications, but many may not be aware of the controls and features that the Play Store has to offer. Let’s go over some of these features that could prove useful.

0 Comments
Continue reading

Good Practices Often Yield Good Results

Good Practices Often Yield Good Results

If you are a frequent reader of our blog, you will notice that “best practices” is a term that is used generously. That is because there are certain ways to go about things when you are working with technology. Today, we wanted to go over what the term actually means and why they are important when managing your business. 

0 Comments
Continue reading

How Employees Can Cause a Threat, and How to Avoid Them

How Employees Can Cause a Threat, and How to Avoid Them

What would you consider to be the biggest threat to your business and its continued operations? Cybercrime? A natural disaster? What if I told you that it was the team members that you have employed—whether they meant to be or not? This is the hard truth that you need to prepare your business to resist.

0 Comments
Continue reading

Tip of the Week: Simple IT Practices for Business Success

Tip of the Week: Simple IT Practices for Business Success

Most businesses nowadays rely quite heavily on information technology to operate, as I’ve no doubt that you’re aware of. That’s why we thought it would be valuable to share some very simple IT best practices to help assist your operations by keeping your resources productive and secured.

0 Comments
Continue reading

A New SolarWinds Flaw Likely Had Let Hackers Install SUPERNOVA Malware

solarwinds-malware

An authentication bypass vulnerability in the SolarWinds Orion software may have been leveraged by adversaries as a zero-day to deploy the SUPERNOVA malware in target environments.

According to an advisory published yesterday by the CERT Coordination Center, the SolarWinds Orion API that's used to interface with all other Orion system monitoring and management products suffers from a security flaw (CVE-2020-10148) that could allow a remote attacker to execute unauthenticated API commands, thus resulting in a compromise of the SolarWinds instance.

0 Comments
Continue reading

Microsoft Says SolarWinds Hackers Accessed Some of Its Source Code

microsoft-source-code-hacking-solarwinds

Microsoft on Thursday revealed that the threat actors behind the SolarWinds supply chain attack were able to gain access to a small number of internal accounts and escalate access inside its internal network.

The "very sophisticated nation-state actor" used the unauthorized access to view, but not modify, the source code present in its repositories, the company said.

0 Comments
Continue reading

A Google Docs Bug Could Have Allowed Hackers See Your Private Documents

google-doc-hack

Google has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents simply by embedding them in a malicious website.

The flaw was discovered on July 9 by security researcher Sreeram KL, for which he was awarded $3133.70 as part of Google's Vulnerability Reward Program.

0 Comments
Continue reading

Are Your Employees’ Smartwatches Security Risks?

Are Your Employees’ Smartwatches Security Risks?

The smartwatch is one of the most popular gifts given to technology lovers; and, they have quite a bit of utility. They can help improve communication, health, and of course give them a sleek accessory. One problem that people don’t often consider is how their employer has to handle the influx of smartwatches and other IoT devices that are brought to work after the holidays. Today, we’ll briefly discuss how Internet of Things devices could be security risks and what a business should do about it. 

0 Comments
Continue reading

Small Business Trends for 2021

Small Business Trends for 2021

It's no secret that small businesses are facing one of the toughest periods in decades. The COVID-19 pandemic and many other issues have made them change the way they approach operations, sales, and other aspects of their businesses. Today, they need to explore more strategies that can support customers who also have had to adapt. Today, we’ll talk about a couple of the trends we expect to see in IT in 2021. 

0 Comments
Continue reading

Tip of the Week: 4 Resolutions for Your Business Technology

Tip of the Week: 4 Resolutions for Your Business Technology

2021 is almost here, and if your business isn’t using technology to its fullest capability, you’re missing out on some considerable opportunities. Let’s go over a few winning strategies that you should adopt in the coming year.

0 Comments
Continue reading

By accepting you will be accessing a service provided by a third-party external to https://hexafusion.com/