by Tom | Aug 28, 2016 | Blog, Newsletter
Computers have evolved from giant machines that take up an entire room, to compact devices that can fit in your pocket. In fact, today’s smartphones are more powerful than computers built a decade ago, which is an impressive testament to the growth of computing. This...
by Tom | Aug 26, 2016 | Blog
Technology can be fickle at times. When it’s not working properly, it can hold your business back from reaching its maximum potential. Therefore, in order to maximize your bottom line, it becomes common sense to ensure that your technology is in proper working order...
by Tom | Aug 24, 2016 | Blog
Instant messaging has changed the way that individuals communicate with one another, both in their personal lives and in the workplace. Just as email threw a wrench in traditional mail’s plans, instant messaging threatens to jump start a new method of...
by Tom | Aug 22, 2016 | Blog
It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and...
by Tom | Aug 19, 2016 | Blog
Shopping for a cloud solution can be difficult. You’ll be sold on plenty of impressive-sounding features that you may not know anything about. One feature that you may have seen floating around is autoscaling, which sounds great on paper, but may not live up to its...
by Tom | Aug 17, 2016 | Blog
One way that your business can save money is by purchasing used computer equipment, but only if you do your research and perform a meticulous analysis of where it’s been, and why it’s no longer being used. If you’re serious about purchasing pre-owned computing...
by Tom | Aug 15, 2016 | Blog
It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal...
by Tom | Aug 12, 2016 | Blog
Businesses need to take security into account and make it a priority. In fact, security is so important that Verizon has compiled a report of the various types of attacks and data breaches that occurred in the past year. This is Verizon’s Data Breach Investigations...
by Tom | Aug 11, 2016 | Blog
Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users...
by Tom | Aug 10, 2016 | Blog
Working remotely is made much easier thanks to today’s modern technology solutions. Many organizations have at least part of their workforce working remotely, but without the proper support, remote work wouldn’t be possible. With the latest technology and a couple of...
by Tom | Aug 8, 2016 | Blog
While we tend to focus on the latest technology solutions in the workplace, sometimes it helps to view them from a different perspective, like recreation. Specifically, Windows 10 has become a popular operating system amongst PC gamers, and has reached nearly half of...
by Tom | Aug 5, 2016 | Blog
There’s a new augmented reality game on the market these days. Perhaps you’ve heard of it – a title called Pokemon Go, which lets you capture virtual monsters that “appear” on your smartphone’s camera. However, hackers have seized this opportunity to infect...
by Tom | Aug 3, 2016 | Blog
One of the main ways to keep an account’s credentials secure is by changing them consistently. However, we ran across an article recently that plays “devil’s advocate” on the password security issue, and they made some fair points about how changing passwords too...
by Tom | Aug 1, 2016 | Blog
“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now,...
by Tom | Jul 29, 2016 | Blog
The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was...