by Tom | Aug 8, 2016 | Blog
While we tend to focus on the latest technology solutions in the workplace, sometimes it helps to view them from a different perspective, like recreation. Specifically, Windows 10 has become a popular operating system amongst PC gamers, and has reached nearly half of...
by Tom | Aug 5, 2016 | Blog
There’s a new augmented reality game on the market these days. Perhaps you’ve heard of it – a title called Pokemon Go, which lets you capture virtual monsters that “appear” on your smartphone’s camera. However, hackers have seized this opportunity to infect...
by Tom | Aug 3, 2016 | Blog
One of the main ways to keep an account’s credentials secure is by changing them consistently. However, we ran across an article recently that plays “devil’s advocate” on the password security issue, and they made some fair points about how changing passwords too...
by Tom | Aug 1, 2016 | Blog
“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now,...