Atlanta Microsoft Expert
  • Home
  • About
  • Contact
  • Services (678) 365-9983
  • Thoughts on Tech
  • Customer
    • Login
    • Knowledge Base
Atlanta Microsoft Expert
  • Home
  • About
  • Contact
  • Services (678) 365-9983
  • Thoughts on Tech
  • Customer
    • Login
    • Knowledge Base

Browsing Category

Computer Storage

1 post
computer and clouds on grey background
Steve Agnew
  • May 9, 2023

Tech Tips for Everyday UsersTame Your Frustration: How OneDrive and Office 365 Can Help Manage Your Laptop or PC Storage

  • No comments
We’ve all been there – working on our laptop or PC, only to receive the dreaded “low disk…
  • Business Social Media
  • Computer Storage
  • Data Protection & Encryption
  • Hardware
  • Tech Tips for Everyday Users

Latest Cyber Security News

  • API security in the spotlight – Week in security with Tony Ansco...
    Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought. The post API security in the spotlight – Week...
    Published on: 2023-06-02
  • All eyes on APIs: Top 3 API security risks and how to mitigate t...
    As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency The post All eyes on APIs: Top 3 API...
    Published on: 2023-06-01
  • 5 free OSINT tools for social media
    A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms The post 5 free OSINT tools for social media appeared...
    Published on: 2023-05-31
  • Tricks of the trade: How a cybercrime ring operated a multi‑leve...
    A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys The post Tricks of the trade: How a cybercrime ring operated a...
    Published on: 2023-05-30
  • How a legitimate app morphed into a trojan – Week in security wi...
    ESET research uncovers an app that was initially legitimate but months later received an update containing malicious code The post How a legitimate app morphed into a trojan – Week in security with Tony Anscombe...
    Published on: 2023-05-26
  • Shedding light on AceCryptor and its operation
    ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families The post Shedding light on AceCryptor and its operation appeared first on WeLiveSecurity...
    Published on: 2023-05-25
  • Digital security for the self‑employed: Staying safe without an...
    Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business The post Digital security for the self‑employed: Staying safe without an IT team to help...
    Published on: 2023-05-24
  • Android app breaking bad: From legitimate screen recording to fi...
    ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio The post Android app breaking bad: From legitimate screen recording to file exfiltration within a year...
    Published on: 2023-05-23
  • The real cost of a free lunch – Week in security with Tony Ansco...
    Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for The post The real cost of a free lunch – Week in security with Tony...
    Published on: 2023-05-19
  • 5 useful search engines for internet‑connected devices and servi...
    A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet The post 5 useful search engines for internet‑connected devices and...
    Published on: 2023-05-18
  • Meet “AI”, your new colleague: could it expose your company’s se...
    Before rushing to embrace the LLM-powered “hire”, make sure your organization has safeguards in place to avoid putting its business and customer data at risk The post Meet “AI”, your new colleague: could it expose...
    Published on: 2023-05-17
  • Key findings from ESET’s new APT Activity Report – Week in secur...
    What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business? The post Key findings from ESET’s new APT Activity...
    Published on: 2023-05-12

Atlanta Microsoft Expert
Designed & Developed by Atlanta Microsoft Expert (678) 365-9983