Blog

4 BYOD security risks you should address

4 BYOD security risks you should address

In the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home with us. And, with bring your own device (BYOD) strategy, businesses have never been so productive.

What is the Blue Screen of Death?

What is the Blue Screen of Death?

So your computer just crashed. Our condolences. When your PC displays a blue screen and spontaneously restarts your computer, this is called the Blue Screen of Death (BSoD). These errors are usually caused by internal failures in your hardware or, sometimes, your software.

5 tips for using Facebook reactions

5 tips for using Facebook reactions

Simply getting a ‘Like’ on your post is not enough anymore. It doesn’t give you any other useful data and you can’t immediately tell what people feel about your post. However, with Facebook reactions, you can be getting just what your company’s social media page needs.

7 Warning signs of malware infection

7 Warning signs of malware infection

As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection.

10 Office 365 features you need for work

10 Office 365 features you need for work

Whether you need suggestions for your PowerPoint presentation, someone to edit your Word document or input a lot of data into Excel, Office 365 has the features to help you with a variety of tasks. So the next time you need some help getting work done, try using these tricks with Office 365.

Simultaneously edit a document with other people

With Office 365, people can work together on any Word, PowerPoint or Excel document in real time.

Disaster Recovery myths that no longer apply

Disaster Recovery myths that no longer apply

With technology changing so rapidly, it’s easy to get caught up in outdated beliefs. And when it comes to Disaster Recovery, far too often do we see business owners still clinging to ideas that no longer apply. So, what kind of DR myths are still widely accepted by the masses? Here are three that need to be retired into IT folklore.

Revive your old laptop this Spring

Revive your old laptop this Spring

There comes a point in the life of every laptop where its hard drive slows and it begins to function at a snail’s pace. At this point, many people either toss it or retire it to the back of a closet. If you’re one of the latter, then this Spring you may be able infuse life into it.