click to reveal
1.800.399.2648
X
Sign Up for CMIT Quicktips!


X
ENTER POSTAL CODE
Dangerous Weather Highlights the Need for Strong Backup and Disaster Recovery Procedures
They say April showers bring May flowers, but this week’s severe weather delivered far bigger problems to the Southeast and Mid-Atlantic. A low-pressure system tracking up the Eastern Seaboard dumped much-needed rain on the drought-stricken region. But... more
Microsoft Word Exploit Used to Install Malware on Computers
If you assumed that today’s cyberthreat risk had gone down, think again: security experts revealed last week that hackers have figured out a way to exploit a previously undisclosed vulnerability in Microsoft Word. This allows... more
Mystified by Track Changes? These 5 Tips Will Have You Editing and Collaborating like a Pro
“Just turn on Track Changes.” If those words have ever struck fear in your heart and wreaked havoc on your to-do list, don’t worry — we know the feeling. Yes, Microsoft Word is the industry... more
Phishing Scams Proliferate Again with Tax Day Right Around the Corner
With tax day right around the corner, the targeting of payroll professionals, human resources executives, and tax preparers is again proliferating. Relying on illicit phishing emails that appear to come from a company’s actual chief... more
World Backup Day 2017: The Perfect Time to Assess Your Data Security Situation
Friday, March 31st is World Backup Day, and given the many recent instances of data loss plaguing businesses big and small, no question is more relevant than, “What would you do if you lost it... more
The 3 P’s of Cybersecurity — How to Put These Basic Fundamentals to Work for Your Business
Last week, Bob Lord, Chief Information Security Officer at Yahoo, headlined a panel at SXSW in Austin, TX, entitled The New Normal: User Security in an Insecure World. Instead of focusing solely on the threats... more
Enhance Productivity and Efficiency by Becoming a PDF Master with Adobe Reader and Adobe Acrobat
The PDF, or portable document format, is a beautiful thing. No matter what kind of laptop, desktop, mobile phone, or operating system you use, it works. No matter how many different fonts, images, and other... more
New Cloudflare Vulnerability Could Leak Passwords, Logins, and Other Protected Information
Another major security flaw shocked the Internet world last week — Cloudflare, a service that optimizes the security and performance of more than 5 million websites, alerted customers that a recently patched software bug had... more
10 Questions to Ask if You Want the Best IT Support for Your Business
In today’s fast-paced digital world, every business relies on solid IT support. But for companies on a budget, finding that kind of support can be difficult. Smaller IT firms often find themselves stretched too thin... more
Beware Browser Auto-Fill — New Phishing Attack Can Steal Critical Information
Browser auto-fill is one of the most convenient modern Internet features. Popular browsers like Google Chrome, Apple Safari, Microsoft Edge, and Mozilla Firefox save computer users time by automatically populating form fields and login requests... more
Go to next page