Tip of the Week: 4 Guidelines When Buying Used Computer Equipment

used_computer_400.jpg

One way that your business can save money is by purchasing used computer equipment, but only if you do your research and perform a meticulous analysis of where it’s been, and why it’s no longer being used. If you’re serious about purchasing pre-owned computing equipment, consider these four tips. The Hard Drive’s AgeOne of the […]

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

irs_scam_400.jpg

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be […]

Study: 95% of All Cyber Attacks are Financially Motivated

verizon_network_security_400.jpg

Businesses need to take security into account and make it a priority. In fact, security is so important that Verizon has compiled a report of the various types of attacks and data breaches that occurred in the past year. This is Verizon’s Data Breach Investigations Report, or DBIR, and it offers insights into how you […]

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

alert_windows_and_edge_updates_400.jpg

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk. If you’ve already applied the […]

Tip of the Week: 4 Easy Ways to Make Working Remotely Work for You

working_remotely_400.jpg

Working remotely is made much easier thanks to today’s modern technology solutions. Many organizations have at least part of their workforce working remotely, but without the proper support, remote work wouldn’t be possible. With the latest technology and a couple of best practices, the remote worker can be just as productive, if not more so, […]

New High Score for Microsoft: More Than 44% of All PC Gamers Use Windows 10

steam_windows_10_400.jpg

While we tend to focus on the latest technology solutions in the workplace, sometimes it helps to view them from a different perspective, like recreation. Specifically, Windows 10 has become a popular operating system amongst PC gamers, and has reached nearly half of the considerable total user base of the cloud-based gaming platform, Steam. For […]

Download the Wrong App and Have More Than Pokémon Fever Infect Your Device

droidjack_hurting_companies_400.jpg

There’s a new augmented reality game on the market these days. Perhaps you’ve heard of it – a title called Pokemon Go, which lets you capture virtual monsters that “appear” on your smartphone’s camera. However, hackers have seized this opportunity to infect players’ mobile devices with a backdoor called DroidJack, which uses the mobile app’s […]

Tip of the Week: Why You Should Rethink Routinely Changing Your Password

secure_yourself_password_400.jpg

One of the main ways to keep an account’s credentials secure is by changing them consistently. However, we ran across an article recently that plays “devil’s advocate” on the password security issue, and they made some fair points about how changing passwords too frequently can lead to decreased security as a whole. At first, this […]

Warning: It’s Now a Crime to Share Your Netflix Password

netflix_password_sharing_no_no_400.jpg

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on […]

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

new_petya_friend_400.jpg

The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hepless user clicked the […]

Tip of the Week: 4 Windows 10 Tips You’ll Use Again and Again

useful_windows_10_tips_400.jpg

It’s been almost one year since the release of Windows 10. Are you taking advantage of everything Windows 10 offers? Here are four of the best Windows 10 features that you’ll want to start using right away. Virtual DesktopsIf you’ve never used a virtual desktop before (not to be confused with desktop virtualization), it’s a […]

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

android_malware_400.jpg

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones […]

Ancient Greek Computer in Serious Need of Firmware Update

ancient_greek_computer_400.jpg

When you picture an old computer, do you see a giant machine that takes up an entire room? These days, people might consider even something like a CRT monitor and a device running Windows XP to be ancient. Yet, the oldest “computer” in the world may actually be a bronze contraption found off the coast […]

Tip of the Week: 5 Easy Ways to Move Several Files at Once

multiple_file_storage_400.jpg

File storage is a staple in the office, and chances are that even your work desktop is jam-packed with files and folders that could use a bit of sorting. This might include moving all of your files to different locations, but you don’t have to move each one individually. We’ll go over the many different […]

Newly Discovered Vulnerability Gives Reason to Worry for Every Windows User

badtunnel_vulnerability_400.jpg

A vulnerability has been discovered that affects all versions of Microsoft’s Windows operating system, including the long-unsupported Windows XP, going all the way back to Windows 95. The vulnerability, called BadTunnel, allows attackers to directly bypass system defenses and initiate a man-in-the-middle attack. The vulnerability isn’t limited to just Windows, either; it also affects Internet […]

How Your Business Can Take Advantage of These 4 Mobility Trends

enterprise_level_mobility_solutions_for_business_400.jpg

In a world where mobility is king, it can be challenging at best to implement new solutions without first taking into account how they can affect your business’s mobility. Especially with the cloud gaining ground, companies have their eyes on mobility and the requisite security, hoping to achieve greater flexibility and profitability by doing so. […]

Tip of the Week: 6 Truths to Guide Your PC Troubleshooting Efforts

shooting_trouble_troubleshooting_400.jpg

We’ve all ran into problems that weren’t easily solvable, even by technically-proficient people. In fact, it’s often the case that simple problems can be escalated far beyond where they deserve to be. Sometimes all it takes is a little outside perspective, and some out-of-the-box thinking, to fix an issue. The next time you run into […]

Microsoft Moves to Get a Piece of the Technology as a Service Market Share

microsoft_technology_as_a_service_400.jpg

Microsoft has been looking to cover more ground in the business environment by offering a new Technology as a Service (TaaS) offering, which will allow small businesses to purchase Surface products, accessories, and support for their devices, all with a monthly payment plan. Also, when it comes time to upgrade, customers can easily make the […]