February 14th, 2019

Users of Facebook Messenger, which number over 1.2 billion people worldwide, now have a new feature that makes life a bit easier after making an “oops.” An oops is a mistake in an instant message that is immediately noticed, right after sending it, by the person who wrote it. It could be that a message […]

February 13th, 2019

There is a lot to love about the work that you do, and hopefully, your technology is part of that. Loving your IT means having a great relationship not only with the devices, software, and applications you use each day, but with the folks who look after them.   If you’ve stopped feeling that spark […]

February 13th, 2019

  Microsoft Office 365 is a suite of services that includes Customer Lockbox and Privileged Access Management. Both tools to assist customers in meeting their compliance obligations and maximizing data security and privacy. These tools are currently only available for customers with Office 365 Enterprise and Advanced Compliance SKUs. Privileged accounts are being compromised more rapidly every day and […]

February 13th, 2019

Apple is yet to disclose how much it is going to reward a 14-year-old U.S. teenager for discovering a massive security breach on its FaceTime video call system. It is believed that part of the reward money will be set aside for his high school education fund. On Thursday, Grant Thompson noticed the group FaceTime bug while on a […]

February 12th, 2019

Cybersecurity threats have shown no signs of slowing down, and small and mid-sized organizations are expected to be more heavily targeted going forward. Although splashy headlines about Fortune 500 companies suffering breaches may lead some business leaders to think that hackers are after big corporations, cybercriminals are just as likely to steal data or infect your system with ransomware. […]

February 11th, 2019

Hiring an IT consultant is a proven method of boosting small to midsize businesses beyond their current capabilities. Rather than hiring full-time employees or tying up internal resources, businesses can allow an IT consultant to do some of the heavy lifting. That’s not to suggest that hiring an IT consultant does not have some pitfalls. Here are […]

February 6th, 2019

Ransomware. Ransomware. You have heard the word and know it involves a cyberattack. You assume from news reports that it only happens to large companies like Target, Equifax, and Marriott Hotels for example, and that cybercriminals will not want to bother with your small or medium-sized business (SMB). Unfortunately, that assumption is wrong. The Federal […]

February 6th, 2019

 What Can You Use Personalized PowerPoint Photo Calendars for? A personalized photo calendar is a great way to provide loved ones with updated family pictures during holidays and birthdays. You can print them out on regular paper or cardstock, or send your projects to family and friends digitally. It’s simple to complete in Microsoft […]

January 31st, 2019

Adding a new name and email address to your list of Microsoft Outlook contacts is pretty simple. There are two different ways you can do it depending on whether you want to add the contact information from an email or just want to create a brand new contact. How to Add a Contact From an […]

January 30th, 2019

A major FaceTime bug discovered recently has left Apple device users skittish about yet another privacy concern and forced the tech giant to scramble for a fix for the issue. For users of Macs or iPhones, understanding the FaceTime flaw and knowing how to disable the function are important steps until the issue is fully […]