Blog

Your passwords are not secure

Your passwords are not secure

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today — the combination of letters, capitalizations, and numbers — NIST admits that the existing guidelines were misguided.

5 computer tips that add hours to your day

5 computer tips that add hours to your day

There are only so many hours in the workday, so making the most of your time is vital. If distracting websites, unorganized files, and cluttered inboxes prevent you from getting work done, consider using these tips to better manage your time and stay productive at work.

Why you shouldn’t write off Firefox

Why you shouldn’t write off Firefox

Mozilla, the creator of Firefox, has spent some time and energy on projects that ended up going nowhere. But this time , they seem to have found their focus. No, it’s not on their built-in video chat service or mobile phone OS, but rather something that should’ve been obvious to them, their most successful product, Firefox.

Top tips for picking the right power supply

Top tips for picking the right power supply

There are plenty of hardware specifications to consider when installing a new workstation in the office, but one you should focus on first is the power supply unit (PSU). Choosing a faulty, substandard PSU often leads to unstable systems and poor performance.

How do I kickstart my Facebook ad?

How do I kickstart my Facebook ad?

Facebook’s not only for posting cat photos, complaining about restaurants, or stalking your ex, it’s also an incredibly effective advertising platform. From small businesses to big corporations, anyone can benefit from Facebook’s marketing tools.

How to Train Your Employees to Keep Your Company’s Data Safe

How to Train Your Employees to Keep Your Company’s Data Safe

Many successful cyberattacks are caused by human error rather than a problem with technology alone. While outdated operating systems and ineffective firewalls and antivirus may also be to blame for a data breach, there’s no substitute for training your employees and making sure they’re fully aware of the risks facing your company.

Office 365’s web app launcher gets an update

Office 365’s web app launcher gets an update

Even with all the productivity tools available within Office 365, using several apps at once is not always easy. With Microsoft’s new web app launcher, that’s about to change. It includes a cleaner interface and some small yet functional changes, which gives users a more organized and less cluttered Office 365 environment.

Equifax sheds light on incident response

Equifax sheds light on incident response

What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same fate as Equifax, which is an interesting story we’re about to tell.

How to Protect Your Business from Cyber Extortion

How to Protect Your Business from Cyber Extortion

A relatively new type of malicious computer program known as “ransomware” has become a global epidemic affecting businesses of all sizes.

This fast-spreading threat has grown so quickly that it’s become a $5 billion industry according to estimates by cybersecurity experts.

Top reasons why you should consider ERP

Top reasons why you should consider ERP

When small- and medium-sized businesses expand, they need tools that can support their growth. For many, this includes cloud productivity software and managed IT services. And if you need tools for accounting, project planning, supply chain management, and sales, there’s enterprise resource planning (ERP) software.