September 11, 2019

Which is best, HDD or SSD?

The hard disk drive (HDD) has been the primary storage device for desktop computers and laptops for a long time. But with the invention of solid […]
September 9, 2019

Save time with Bookings by Office 365

We all undeniably have hectic schedules, and they’re made even worse with unorganized meetings, impromptu playdates, and unscheduled yoga classes. To move or cancel appointments, your […]
September 6, 2019

Optimizing website images for SEO

Small- and medium-sized businesses are often tempted to relegate their search engine optimization (SEO) analyses to the free reports offered by online platforms like WordPress and […]
September 5, 2019

Back up your data with these solutions

Today’s businesses rely heavily on data to run their day-to-day operations. They use it for everything from building client relationships to developing marketing strategies and so […]
September 4, 2019

Free your File Explorer of ads

Surprised that ads have taken over your Windows 10 PC, laptop, or Surface Pro? You can still have an ad-free experience with Windows 10 In this […]
September 3, 2019

No ransom: A place for free decryption

Although a ransomware attack may seem targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, and the further it […]
September 2, 2019

How to deal with Android bloatware

When you buy an Android mobile phone, the mobile carrier often installs certain apps onto the device. These apps, commonly referred to as bloatware, are usually […]
August 29, 2019

Why Google now prioritizes mobile searches

Google recently made changes to its search tools to prioritize mobile searches over web searches. Why has Google done this and what does this mean for […]
August 28, 2019

How to make the most out of your Time Machine

If you’re a Mac user, you probably know that macOS has a built-in feature called Time Machine. This backup application is used to keep an up-to-date […]
August 27, 2019

How to keep your data safe and secure

Data security and privacy should be every small business owner’s top priority in this day when cybercriminals are on the loose. The good news is you […]
August 1, 2016

Set your ransomed files free, for free

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use of it. Unfortunately, computer hackers have […]
August 18, 2016

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, […]
September 2, 2016

Reset your Dropbox password

Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At the time, Dropbox reported that a collection of […]
September 21, 2016

9 essential cybersecurity phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping […]
October 7, 2016

Social engineering and cyber security

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually […]
October 25, 2016

2 types of identity verification, explained

Cyber security is becoming more and more important in an increasingly digital age. While many people and businesses know how important their online security is, they […]
November 10, 2016

Young workers are more gullible to tech scams

The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they’re taking their tactics to the […]