IT Blog

How good is your disaster recovery plan?

You may think you know all about disaster recovery plans (DRP) from attending conferences or reading up on the subject. But one of the best ways to learn is by example, and the following real-life case offers valuable lessons. Learn about the DPR audit of a state government office and the knowledge gained from it. […]

Moving files from Android to PC or Mac

Maybe you ran out of phone memory so you need to transfer files from your mobile to your hard drive, or maybe you need a bigger screen to work on something and your computer provides that, or maybe you just really like reading how-to articles. Whatever brought you to this page, here’s how to transfer […]

What are virtual containers?

Virtual containers are changing the way business IT design and support are carried out, just like virtualization technology did a few years ago. If your small business could benefit from reduced computer hardware costs and increased workplace efficiency, it’s time to learn more about containers. What are containers and why are they so popular? Virtual […]

Four Types of Hackers You Should Know About

Today’s hackers are often driven by political or financial motivations, or they may seek to gain notoriety. The more we know about how they think and act, the better we can protect our organizations from harm. Small and mid-sized businesses that lack the cybersecurity infrastructure of big corporations are especially at risk of exploitation.

Differentiating Groups, Yammer, and Teams

Yammer, Outlook Groups, and Microsoft Teams have plenty in common. They’re all Office 365 tools designed for sharing files and communicating with colleagues. So what differentiates each from the other and when should you use them? Let’s take a quick look. Outlook Groups With Outlook Groups, every member gets a shared inbox, calendar, project planner, […]

Turn off Windows 10’s invasive settings

Windows 10 is slowly becoming the operating system of choice because of its improvements over past versions. But it isn’t perfect, as many users have complained about its intrusive default privacy settings. Reclaim your privacy with these tips on disabling its nosy settings. Turn personalized advertising off For those unaware, Windows 10 assigns each user […]

Fileless malware: The guileful threat

Fileless malware isn’t new and is an increasingly prevalent threat against organizations of all sizes. This type of malware is not as visible as traditional malware and employs a variety of techniques to stay persistent. Consequently, it can adversely affect your business process and the infrastructures that run them.

Google Alerts: Keep watch on your business

Business technology evolves rapidly that more and more customers are turning to those that can deliver products and services fast. Business owners have Google to thank for creating an avenue to monitor web content so you don’t miss out. Smart businessmen leverage this tool to also monitor their businesses and their competitors. Read to learn […]

Check out iOS 12’s security & privacy features

iOS 12 brings a significant performance boost to both the previous and the latest iterations of Apple mobile devices, but that’s not all it has to offer. It also has an array of new and improved security and privacy features that you can tweak to better protect your iPhone or iPad and the data it […]

PC makers struggle to meet demand

Top PC makers are becoming more concerned as Intel CPU shortages continue to persist. According to several reports, Intel has struggled to keep up with the rising demand for high-performance computer chips, which will affect millions of businesses. Here’s a quick rundown on the Intel PC shortage. Reasons for the shortage There are many contributors […]