Our Blog

March 30, 2020

Mac Threats Are on the Rise

Cybercriminals are targeting Mac devices at an alarming rate. Find out why the rate is increasing and the types of threats Mac users face. In the […]
March 26, 2020

What You Need to Know about the New Microsoft Edge

With little fanfare, Microsoft introduced a Chromium-based version of Microsoft Edge. Here is what you need to know about Chromium and the new Edge browser. With […]
March 23, 2020

The Shift to Cloud Computing Can Be Beneficial, But Not Without Risk

This multi-billion dollar industry of Cloud Computing will be on trend for years to come, but there are a few risky items to consider before switching […]
March 19, 2020

5 Ways to Spring Clean Your Computer

Spring cleaning is not limited to just closets and cabinets. Spring is a good time to clean your computer as well. Here are five ways to […]
March 16, 2020

Still Using Windows 7? Here Are Some New Reasons Why You Might Want to Upgrade

If your business is still using Windows 7, some new research and recent bugs might persuade you to reconsider that decision. Here is what you need […]
March 12, 2020

What Businesses Can Learn from the Ransomware Attacks Besieging Local and State Governments

Local and state governments are increasingly becoming ransomware victims. Even worse, some of them are paying large ransoms to get their data back. Find out how […]
March 9, 2020

Examining the Equifax Data Breach and Its Perpetrators

The US Department of Justice has brought charges against the hackers responsible for breaking into Equifax’s computer systems and stealing the personal data of 145 million […]
March 5, 2020

iPhone is now Capable of Creating an Encrypted Google Safety Key

Google is updating their Google Smart Lock app to include iPhone users the ability to use their device as an encrypted security key, bypassing the need […]
March 2, 2020

Data Practices of US Companies Being Investigated in New Probes

Google and Facebook might be in trouble again for how they are collecting and using customers’ data. Learn about the newest investigations into their data privacy […]