Is a File Really Gone When You Delete It?

Deleting a file

Do you wonder what happens when you delete a file from your computer? You probably hit the delete button to send it to the Recycle Bin, then empty the bin and think it is gone forever. But is it really? Read on to find out what is happening behind the scenes. Continue reading

AI is Great, but be Careful!

AI, Artificial Intelligence

If you’ve been using AI services such as Copilot or ChatGPT in your business, you will know how helpful it can be. Whether analysing a spreadsheet, summarising an email or  generating ideas, these AI tools can save you time and effort. But, like any powerful tool, they come with their own risks. One big concern is how they learn from the data they are given. In this article we dive into why this is important and what you need to watch out for. Continue reading

The Pros and Cons of Incognito Browsing

Private Browsing / Incognito Modem

Many people are increasingly concerned about privacy, and your browser’s Private Browsing Mode (or Incognito Mode), offers a simple way to keep your online activities hidden from others who share your computer. Continue reading

Top Breaches of 2023 and How You Can Protect Yourself

Computer Security

The battle against cyber threats is an ongoing challenge and unfortunately there is no one thing that will protect you 100% and 2023 has proven to be a watershed year for data breaches. Data compromises have surged to an all-time high in the U.S. This is based on data from the first 9 months of the year. Meaning that numbers will only end up higher for the year. Continue reading

MS Edge – Is It Any Good?

MS edgeIn the internet browser market, Microsoft has made enormous strides since discontinuing the much-maligned Internet Explorer. Microsoft Edge is the successor to Internet Explorer and arguably provides the best web experience for business users. Continue reading

6 Steps on How to Safely Retire Your Old Devices

Upgrading your technology

We all like upgrading to the latest and greatest tech. But before you get too distracted by your shiny, new device, take the time to think about what you are going to do with your old one. You may give it to someone else or let it sit in the corner but either way, it is important to take steps to protect the data on that old device before moving on. Continue reading

The Pros and Cons of BCC

BCC v CCMost people have at some point, “replied all” when meaning to reply to only one person. It is definitely embarrassing, can be a major privacy issue and aggravates those people with emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages – this “little” mistake can prove costly for business. Continue reading

How to Protect Your Business & Your Customers Privacy and Security

Unknown threatsSecurity and privacy are at the very top of our priorities when considering your business IT needs. Major data leaks are now in the news on a daily basis and these leaks costs the companies thousands if not millions of dollars. Our number one goal is to make sure our clients and their businesses are kept out of danger to the best of our abilities.

Continue reading

OK Google, How Safe Are You Really?

Ok, Google

More and more people are implementing smart homes and including devices such as  Google Home and Amazon Alexa. Android and iOS devices also include assistant technology. Smart home assistants can help users by searching online, starting phone calls, ordering groceries, playing music and turning on devices all with a single spoken command.

Continue reading