Common security threats – Ransomware

What is Ransomware: Malicious software designed to encrypt a victim’s files and then demand payment, generally in anonymous Bitcoin, in exchange for decrypting the files. As with other malware infections, ransomware attacks typically start with employees falling victim to phishing emails or visiting compromised websites. Unlike other malware infections, however,…

Continue Reading

Common security threats – Social Engineering

What is Social Engineering: There are two ways to steal anything — you either take it yourself or you get someone else to give it to you. Social engineering is a broad umbrella term for any tactics designed to exploit and manipulate trust. Hence, the victim hands the attacker what…

Continue Reading

Common security threats – Phishing

What is phishing: Any attempt to compromise a system and steal information by tricking a user into responding to a malicious message. The most common phishing attacks involve emails armed with malware hidden in attachments or links to infected websites. However, phishing can be conducted via other methods such as…

Continue Reading

Common security threats – Zero-Day Attack

The first key to any effective security game plan is knowing what you’re up against. We decided to share some of our knowledge and create for you a set of short, informative but simple blogs where you’ll learn all about ten of the most common threats your company is likely…

Continue Reading

From eWorker to Office Warrior

With work locations in Canada, the US, Europe and Dubai, the iRangers team is spread around the world. Some of the iRangers work in our offices, while others connect remotely. Dima Razbornov has been working as part of the team remotely for 4 years and this spring he joined the…

Continue Reading

Microsoft Intune – helps you simplify IT delivery

With thousands of organizations taking their infrastructure to the Microsoft Cloud platform today, we at iRangers are observing a common pattern they are struggling with. We notice that often organizations are not aware of all the benefits and possibilities that come with the integration of Microsoft Cloud. One of these…

Continue Reading

Microsoft Enterprise Mobility + Security

The realities of the modern workplace are very different from what they used to be just a few years ago. Do you miss the good old days, when you only had to remember one password to login into your computer and everything you needed was right there? Well, most likely…

Continue Reading

SENDAS PERMISSIONS ON MOBILE

Struggling with granting SendAs permissions on user’s cellphones? Just use our lifehack to set it up! Not so long ago, Misha Hanin wrote about the most convenient way to tackle multiple email addresses on your desktop. Now, we want to help you solve the challenge of setting up Receive As / Send…

Continue Reading