Blog

10
Jun

Over the decades, the laptop and notebook computers have become a staple of business computing. In fact, notebooks and laptops now outsell desktops among the hundreds of millions of personal computers sold today. However, outside the introduction of the hybrid ‘2 -in-1’ laptop/tablets introduced several years ago, there hasn’t been a major disruption in the […]

2
May

It’s of course best to do everything you can within reason and appropriate budget to avoid cybersecurity incidents at your business. However, you do need to be prepared to respond to a serious cybersecurity event, such as a hack or other breach. No defenses or planning can ensure 100% security. In the case of a […]

3
Apr

Email phishing remains one of the most prominent–and dangerous–forms of cyberattack. But as users adapt and efforts are made to increase awareness of the prevalence of phishing, attacks via mobile device have become more common. One of the reasons is that the user interface on mobile devices is necessarily simpler and more limited because of […]

15
Jan
password managers

One of the ways to handle lots of passwords today without using the same (or very similar passwords for all of your accounts) is to use a password manager. The idea of a password manager is that it will generate, retrieve, and keep track of long and random passwords for all of your accounts (and […]

15
Dec
g suite

One of the advantages of SaaS is that you get immediate access to updates to software (including bug fixes and new features) on a continual basis. One of the challenges is staying up to date with this innovation. With its broad set of applications, G Suite has a healthy stream of innovation to keep up […]

15
Nov
office 365

One of the advantages of Office 365 is that you get access to a lot of apps–including new ones that Microsoft bundles into Office 365 for free. Some of these fly under the radar and never get noticed or used. Here are 5 that you should be aware of. Teams Microsoft’s answer to Slack.Team’s is […]