Blog

Tech tips, news, and expert insights

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. […]

How To Back Up Your Smartphone

You regularly back up your computers (or at least you should), but do you do the same with your smartphone? Given the massive amounts of contact information, photos, videos and other data we all carry around on smartphones, it's critical to back them up or risk losing all that data forever.

Arrange meetings with Microsoft FindTime

While an impressive arsenal of weapons can help you win a battle, you need diligence, perseverance and sacrifice to win the war. But when that war is waged in the arena of calendar management, you’re dealing with a whole other monster. When scheduling meetings, uncontrollable factors like varying schedules and department-specific time constraints mean that […]

Regin – how bad is it?

Spend even a small amount of time looking at the various massive malware threats out there and you will find that security experts are usually able to figure out who developed it, the intended targets, and where it is most prevalent. In early November, news broke about a mystery security threat called Regin that has been […]

Investing in 3 main IT areas

IT is in a near constant state of evolution, largely because of the sheer number of technology-based systems and products released on a weekly basis. This fast-paced development has led to the creation of three major IT areas. It is essential that companies invest in these three areas if they want their business to succeed.

How To Keep Your Laptop Secure

You can’t beat the convenience of checking e-mail and hopping on the Internet at (Wi-Fi) hotspots found in airports, coffee shops, bookstores, and even in some major parks. For the uninitiated, Wi-Fi hotspots are areas where you can use your wireless laptop to surf the Web and check e-mail.

3 Critical Facts Every Computer User Must Know About Keeping Their Personal and Financial Information Safe Online

If you own a computer that is connected to the Internet without proper firewall and security measures set up, it's only a matter of time before a worm, virus, hacker, or spyware takes over your computer.

Cyber criminals lurk everywhere on the Internet and are constantly figuring out new ways to access your personal and financial information.

Is That SLOW Computer Driving You Crazy?

Are you frustrated by slow PCs, screen freezes, error messages and things not working right in general? These are all signs that your computer is desperately in need of an upgrade OR a tune up.

What Causes Computer To Run Slow?

Over time, all computers slow down and become progressively worse.

Set your ransomed files free, for free

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use of it. Unfortunately, computer hackers have developed ways to infiltrate your company’s network and systems, take your confidential data hostage, and unlawfully encrypt it. Pay them a ransom and you may or may not get […]