Computers

December 30, 2019

How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them. Many laptops come […]
December 16, 2019

Keep Tabs on Which Version of Windows 10 Your Business’s Computers Are Running

Windows 10 follows a different lifecycle than its predecessors. Learn about this lifecycle and how to check a computer to see if it is running an […]
November 25, 2019

4 Ways You Can Make Microsoft Edge More Convenient to Use

Customizing your web browser will make it easier to use, which can make you more productive. Here are four ways you can customize Microsoft Edge. Microsoft […]
November 21, 2019

New Firefox Version: Another Look

Mozilla has released version 70 of its Firefox web browser. Find out the main changes the company made to better protect your privacy. Mozilla released version […]
October 31, 2019

How to Handle Those Annoying Auto-Play Video Clips in Microsoft Edge

Video clips that automatically start playing when a web page opens can be disruptive, especially at work. Find out how you can quickly mute them or […]
October 17, 2019

Business App Upgrades You Might Want to Add to Your 2020 IT Budget

Microsoft will no longer support many business apps in 2020 because they are reaching the end of their lifecycles. Find out which popular programs are reaching […]
September 19, 2019

How to Protect Your Sensitive Business Files with Passwords

Protecting a file with a password can provide an extra layer of security for sensitive business documents. Learn how to password-protect your files in Microsoft Word, […]
August 29, 2019

Assess Your Security with the Microsoft Secure Score Tool

Microsoft Secure Score is a free tool that can help you better protect your Office 365 and on-premises Windows 10 deployments. Find out what this tool […]
August 26, 2019

5 Ways to Protect Your NAS Device from Ransomware

Network-attached storage (NAS) devices are common targets of ransomware attacks. Find out why NAS devices are often attacked and what you can do to protect your […]