Blog

7 Warning signs of malware infection

As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection. So how do you know if your company’s IT […]

Native ad blocker is coming to this browser

Ad blocking is here to stay. Safari, Google Chrome, and Firefox all have extensions that make it possible, and now Opera has added an ad blocking feature directly into the browser. Should your business be concerned? Well it all depends on how much money you spend on online ads. Here’s the lowdown on Opera’s new […]

7 Ways to customize your Windows 10

7 Ways to customize your Windows 10

Whether you want to have a darker color scheme, run several apps at the same time or have multiple desktop displays, Windows 10 gives you many options to personalize your PC. And while some customization options are less obvious than others, it is well worth the effort to get your Windows 10 to act and look the way you want it to.

What’s different with the new iPad Pro?

With a new tablet bound to hit stores again later this month, you’re probably wondering “what’s so special about this new one?” Well imagine a device that’s smaller than the massive 12.9-inch iPad Pro model and more powerful than the iPad Air 2. That is what you can expect from the 9.7-inch iPad Pro. With […]

What You and Your Employees Shouldn’t Do When On Vacation

This is the season when you and your team will be taking a little time off to head to the beach or your favorite vacation spot, and while we know we should completely disconnect from work, most of us will still check e-mail and do a little work while away – and that could end up causing some issues if you’re not careful while working remote.

10 Office 365 features you need for work

Whether you need suggestions for your PowerPoint presentation, someone to edit your Word document or input a lot of data into Excel, Office 365 has the features to help you with a variety of tasks. So the next time you need some help getting work done, try using these tricks with Office 365. Simultaneously edit […]

How to Become Invisible to Hackers

There´s an old joke about two men hiking in the woods when they come across a big, grumpy black bear. Scared silly, one of the guys starts to run but notices his buddy stopped, bent-over, changing his shoes. He shouts to him, “What are you doing? Why aren´t you running?” to which his friend replies, “I´m changing my shoes because I don´t need to outrun the bear – I only need to outrun you.

Disaster Recovery myths that no longer apply

With technology changing so rapidly, it’s easy to get caught up in outdated beliefs. And when it comes to Disaster Recovery, far too often do we see business owners still clinging to ideas that no longer apply. So, what kind of DR myths are still widely accepted by the masses? Here are three that need […]

Security Tip of the Week #2 – Upgrade device firmware

Welcome to the second of our security at Home sub-series of security tips. Staying secure at home has become more than just installing an antivirus program and praying no-one takes an interest. There are of course things that everyone can do to make sure they are not displaying a “help yourself to my stuff” sign outside their door.

Why you should consider virtualization

Before you start purchasing any new hardware, consider virtualizing your IT infrastructure. Virtualization means to abstract the software from the hardware. Basically, as processors have increased in power and memory capacity, one physical server can now act as five virtual servers. Unlike before, where every time you have a new application you have to provide […]