Four Important iOS7 Updates

September 23rd, 2013

Just a few days ago, a free update came to the iPhone, and if you’ve downloaded it, you’ve probably noticed just how much it changes the iPhone. While you’re exploring all of the new features and start getting used to the new interface, here are a few of the more prominent features that you may find useful.

Malicious Browser Extensions Becoming More Common

September 10th, 2013

Attacks on web users are becoming all too common. Kaspersky Lab’s senior security researcher, Fabio Assolini, says “[The user] needs to know that an extension can access everything you do in the browser, all the data, passwords and the websites visited.

5 Android & iOS Compatible Apps for the Travelling Business Owner

September 4th, 2013

We all have certain apps we like to use and that we use for business and for pleasure. However, we don’t think of everything on our own, and sometimes knowing a certain app is out there can improve our lives tremendously. Here are just a few apps you may not have known existed for your Apple or Android device.

Curious About Cloud Services?

August 29th, 2013

Does your office battle with organization? Does paperwork get lost going from one person to another mysteriously, only to show up weeks later in a pile you didn’t know existed? While cloud services won’t solve every problem you’ll ever have, it’s certainly become an essential tool in small and large businesses across the world.

Windows XP Support Disappears April 2014 – Are You Prepared?

August 8th, 2013

On April 8th, 2014, Windows XP support will be completely discontinued by Microsoft. This includes security updates as well, which means if you’re still using XP, it’s time to consider an upgrade.

There’s no shame in still using the once popular Windows XP, but with 2014 approaching faster than you think, it’s more important than ever that you consider keeping your office secure by upgrading appropriately.

Did You Delete Something You Need? Tips on Restoring Files

August 6th, 2013

We’ve all been there – we’ve accidentally deleted something and then emptied the recycle bin before we even realized it was there. Sometimes it’s not that simple and data is corrupted due to a damaged drive. While many of us back up everything we need, sometimes this isn’t automatically done – or the data isn’t on a server.

How to Download Programs without Downloading Spyware

August 5th, 2013

Times have changed, it’s true, but that doesn’t mean attempts to hack your computer are gone. While computer security has gotten stronger in the past decade, so have viruses, spyware, and trojans. Even though you have never tried to download spyware, chances are you’ve had your search engine changed once or twice, or had too many search bars at the top of the screen.

“Spear-phishing” – What it is, and How it Works

The FBI has published a warning that they have seen an increase in criminals who use spear-phishing to attack and gain access to private computer networks. Access is then used to exploit the data “to create fake identities, steal intellectual property, and compromise financial credentials to steal money from victims’ accounts.