Security Advisory: Malicious Attacks using COVID 19 Phishing Emails

Due to recent events, many of us have had to do significant life changes be it personal or work related. This has affected many of us globally and even created a trend that many are using to their advantage, such as people making profit off shipping masks to other countries. So, it comes to no […]
Five tips from Microsoft Detection and Response Team to minimize Advanced Persistent Threats
Microsoft’s Detection and Response Team (DART), in an effort to encourage the use of better security practices, is planning on sharing its experiences wit customers to let others know the methods of hackers. One particular customer story just shows how some organizations are still lax when it comes to security as they had 6 different […]
CT Link is Here to Support You!
To all Our Valued Clients: As the government announces the suspension of work due to the current health crisis, CT Link would like to reassure you that we are still committed to supporting your needs during this difficult time. We understand the impact that this pandemic has brought upon businesses and individuals alike, and we […]
Finance: Adding Business Continuity to your Bottom Line to Help Data Resiliency
Financial firms have the task of making sure that their clients are making the most of their fiscal decisions. From services such as accounting, hedge fund management, and stock investments, your clients put their trust in you to handle their funds and ensure confidentiality. Once that trust is gone, you will most likely lose that […]
Office App: Your new Microsoft Office on the Go
Most Microsoft Office users hardly use their phone to do their work, if ever they do its for revisions or small adjustments. Users usually save majority of the work for when they can use a desktop, this should be expected as the mobile version, while handy, had a lot of limitations. Microsoft took this as […]
Malware in a X-Ray Machine Adds Tumors to the Test Results of Patients
What Malware these days are getting more versatile in the way they do attacks. Ransomware attacks were one-way people thought of new ways to use malicious programs to exhort money from unfortunate victims. Other attacks are meant to exploit vulnerabilities to get into your system to steal your data. Recently however, there has been a […]