The Biggest Vulnerabilities that Hackers are Feasting on Right Now

The Biggest Vulnerabilities that Hackers are Feasting On Right Now

Software vulnerabilities are an unfortunate part of working with computers. A developer works hard to put out a software release with millions of lines of code. Hackers then look for loopholes that allow them to breach that code. Continue reading

6 Discontinued Tech Tools You Shouldn’t Be Using

Discontinued Tech Tools

The one constant thing about technology is that it changes rapidly! Things that were once shiny and new can now be ancient and obsolete. New versions replace those old obsolete tools and the continued use of old technology can leave computers and networks vulnerable to attack. Continue reading

Changing Your Email Address?

Changing your email address is never fun, but in certain circumstances it is a necessary evil. If you ever need to make a change, there are several things you need to consider. Follow this checklist to ensure you don’t lose data, keep up with your old contacts, and avoid security risks. Continue reading

7 Signs That Your Computer Is Infected With Malware

Infected Systems

Malware (short for malicious software) is an umbrella term that encompasses many different types of malicious code including:

  • Viruses
  • Spyware
  • Ransomware
  • Adware
  • Key loggers
  • Trojans
  • And more

Continue reading

Think Before Sharing Your Documents

Sharing Files

Cloud sharing makes it very easy simple to share files (documents, presentations, spreadsheets etc). In SharePoint, OneDrive, Dropbox, Google Drive you can simply click on a document and click “share”. A link is created, which you can then copy into an email. That done, you can move on to your next “to do” without thinking about it any longer. Continue reading

Understanding the Cost of IT Downtime

Costs of IT downtime

Business downtime can be costly and there is plenty of research that show just how much it can set a business back. Some small businesses can not even bounce back  due to the costs involved with an extended downtime. My latest blog article outlines the many expenses a business can encounter as a result of downtime. Continue reading

MS Edge – Is It Any Good?

MS edgeIn the internet browser market, Microsoft has made enormous strides since discontinuing the much-maligned Internet Explorer. Microsoft Edge is the successor to Internet Explorer and arguably provides the best web experience for business users. Continue reading

Prepare Your IT for the Holiday Season

Christmas Tech

Don’t be the office Grinch this Christmas, prepare your technology and systems to reduce downtime risk, avoid disrupting your customers’ holiday season and your employees’ holiday fun. Continue reading