Austin (512) 336-2970

Archive for September, 2024

Malware Disguised as VPN to Trick Users

Suppose your employees use a VPN to access your company’s network when working remotely securely. In that case, you must know the latest threat targeting enterprises. Researchers have discovered that threat actors ...

WhatsApp for Windows Security Flaw Could Be Serious

Suppose your company uses the popular messaging platform WhatsApp for Windows. In that case, you need to be aware of a potentially critical security flaw that puts your company at risk for ...

Microsoft Sway Exploited to Deliver Malicious QR Codes

Criminals continue to find ways to launch attacks using legitimate cloud platforms and services, and the latest tool to fall victim to bad actors is Microsoft Sway. Hackers are using the product ...

Search and Chat in Gmail With Gemini Integration

Suppose you spend more time searching your Gmail inbox for information than you'd like. In that case, you’ll love the new Gemini AI integration.  In conjunction with the release of two new ...

Protecting Your Google Workspace Account From the Latest Cyber Threat

If your company relies on Google Workspace, you must know about the latest cyber threat.   As you know, setting up a new user account in Google Workspace requires email authentication. Hackers uncovered ...

Microsoft Teams Merges Work and Home Accounts Efficiently

Suppose you use Microsoft Teams for work, school, and at home to communicate and collaborate with friends and family. In that case, you’ll welcome the latest update from the software giant: you ...

Zoom Now Supports Calls with Up to One Million

If you’ve ever been on a Zoom call and thought, “It would be great if more people could join in,” you’re in luck. The biggest name in video conferencing software just announced ...

Microsoft Partnered With Lumen To Improve Its Datacenter Infrastructure

Companies regularly merge businesses to reap the benefits they can offer one another. As a business owner, you’re likely no stranger to this, and neither is Microsoft since they’ve recently formed a ...

Microsoft Apps on MacOS: Security Flaws Exposed

Suppose you use Microsoft productivity apps like Microsoft Word for Mac. In that case, you need to know about a new report from cybersecurity researchers from Cisco Talos. According to the latest ...

Tech-Enhanced Customer Feedback Systems

Your business is likely as successful as the number of people you reach online via SERP results and advertisements. However, getting customers to purchase or schedule services more than once can count ...

Blog

The Big Payoff for Everyday AI Users

The Big Payoff for Everyday AI Users

If you’ve been holding off on using AI tools in your business because you’re worried about security, their effect on[...]
Meet Gemini’s New Feature: Audio PDF Summaries

Meet Gemini’s New Feature: Audio PDF Summaries

If you’re like most business owners, your inbox is probably overflowing with PDFs: Contracts, market reports, pitch decks, sales information;[...]
How Hackers Are Turning Antivirus Tools Into Malware Delivery Systems

How Hackers Are Turning Antivirus Tools Into Malware Delivery Systems

If you thought your antivirus was the ultimate good guy on your network, researchers have some terrible news. Security researchers[...]

Locations

Austin (Mail and Ship to)

5114 Balcones Woods Dr.
Suite 307-429
Austin, TX 78759
(512) 336-2970

Austin (by Appointment)

1144 Airport Blvd
Suite 260
Austin, TX 78702

Company

Since 2003, The Critical Update has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the Austin metropolitan area. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite