Our Blog

June 18, 2018

How to Set Up Two-Step Verification for Your LinkedIn Account

With two-step verification, you can add another layer of security to prevent unauthorized access to online accounts. Here is how to add this extra protection to […]
June 15, 2018

5 Sections You Might Want to Include in Your Cloud Computing Policy

Having a cloud computing policy is important if your business uses cloud services. Here are five sections that you might want to include in it.
June 13, 2018

How to Create Custom Keyboard Shortcuts for the Symbols You Use Most Often in Microsoft Word

Microsoft Word provides keyboard shortcuts for most of its available symbols, but the shortcuts are usually difficult to memorize. Discover how you can create easy-to-remember shortcuts […]
June 11, 2018

The 5 Most Costly Types of IT-Related Cybercrimes

A report issued by the Internet Crime Complaint Center shows that cybercrime victims lost more than $1 billion in 2017. Here are the top five IT-related […]
June 8, 2018

Hackers Infected a Half Million Routers with Powerful Malware

Cybercriminals infected small office and home office routers with the VPNFilter malware. Here is what you need to know about VPNFilter, including what to do if […]
June 6, 2018

Watch Out for GDPR Phishing Scams

Hackers are sending out GDPR phishing emails, trying to trick people into entering the kinds of data that the General Data Protection Regulation is designed to […]
June 4, 2018

Data on Millions of Individuals and Businesses Scraped and Left Unprotected

A data firm used web scraping to collect the data it needed to create in-depth profiles on millions of people and businesses. Discover what web scraping […]
May 31, 2018

How to Troubleshoot Google Service Outages

When a cloud service suddenly stops, people often wonder “Is the whole system down?” The G Suite Status Dashboard can answer this question when a Google […]
May 29, 2018

These Password Recommendations Might Surprise You

The US National Institute of Standards and Technology (NIST) has some surprising recommendations that might prompt you to rethink your business’s password policies. Learn why change […]