Beware Phishy Emils

By Wassef Masri When the accounting manager at a major retail US company received an email from HR regarding harassment training, he trustingly clicked on the link. Had he looked closer, he could’ve caught that the source was only a look-alike address. Consequently, he was spear-phished. The hackers emailed all company clients and informed them […]

Facebook Data Scandal: 3 Things You Can Do To Protect Your Privacy

Facebook has been under steady fire after a scandal that was recently reported by the New York Times and UK media. It was discovered that Cambridge Analytica, a data analytics company, accessed, stored and shared 50 million Facebook users’ personal information in 2014, overwhelmingly without consent. There are several investigations into Facebook’s privacy practices, and […]

The New Gmail Scam

5 Ways to Defend Against Phishing Attacks by: Adrian Turika There’s a reason almost 1 in 3 scam emails were opened in 2016, a number that’s consistently increased since 2011 (Verizon 2016 Report). Phishing is becoming the hackers’ most utilized attack vector. It’s always been the most effective and requires the least amount of heavy […]

Workplace Massages at CrossRealms Boost Muscle Power

Employees expecting dim lights, soft music, and soothing rubdowns got a rude awakening last Friday when two massage professionals brought the Be-Activated muscle activation technique to CrossRealms’ downtown Chicago office. The Be-Activated practitioners elicited giggles, moans and a few screams from employees who took advantage of this unique treatment. “Intense is the only way I […]

How to Protect Your Company from Ransomware: Best Practices for End Users

CrossRealms is taking measures to help clients prevent Cryptolocker and other ransomware attacks at the enterprise level, but many IT managers are asking us whether there’s more that end users can do to help keep their organizations safe. The answer is “yes. “What is Ransomware? Ransomware is a particularly aggressive form of malware that poses […]

How to upgrade and provision Polycom SoundPoint IP 450s, 550s and 650s with 3CX

Note from Usama Have you ever had to install a 3CX system using existing Polycom SoundPoint handsets running older firmware? If so, you would quickly discover that the handsets will not respond to auto provisioning from 3CX and any manual configuration on your part leads to unpredictable results. After few painful and futile attempts, I […]

TECH BLOG | SQL FROM THE GROUND | PART 5

Microsoft portals you through the Akami Netsessions interface to download the RC iso, it takes a deceivingly long amount of time before it will start the download, the download itself only took me about 10-15 minutes. (Clocked at about 28 mb/sec down)             [       In SQL Server […]

Tech Blog | SQL From The Ground | Part 4

What an incredible week for SQL learning! The Bootcamp was INTENSE. In all honesty it should probably have been a four day class as opposed to three days, but such is the nature of learning things quickly. I’m sure four days would have felt crammed still. The last write-up covered Hardware and Installation.. Tuesday we […]

Tech Blog | SQL From The Ground | Part 3

[vc_row][vc_column width=”2/3″][vc_column_text]DOMAIN AND HOSTING: This week I bought a domain and hosting. This is for a separate project but worth mentioning because of its implications for SQL. The hosting I bought was specifically chosen for the ability to have SQL Server hosted. I have three databases hosted on GoDaddy’s servers for my site. In reality […]