Tradies Should Add Technology to Their Tool Belts!

TradespersonThere are many hands-on trades that haven’t traditionally needed technology. Yet modern tech tools help the plumber, carpenter, welder or other tradespeople improve  their productivity and competitiveness. Continue reading

Do Not Get Hooked By a Whaling Attack

Whaling Attack

The executives of your company are the big fish in your sea and cyber-criminals think of them as whales. In fact, whaling is a new cyber-security threat targeting your C-suite level staff. Continue reading

Do You Have An Ink-Sucking Monster For A Printer???

New Printer

How long have you had your printer? Maybe your printer came as a package deal with your desktop or laptop purchase. In many smaller offices you will probably see a less-expensive inkjet printer sitting beside even the fastest PC. Here are some reasons why it is time for a printer upgrade. Continue reading

The Pros and Cons of BCC

BCC v CCMost people have at some point, “replied all” when meaning to reply to only one person. It is definitely embarrassing, can be a major privacy issue and aggravates those people with emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages – this “little” mistake can prove costly for business. Continue reading

To Upgrade Windows 7 or Not?

Windows 7 EOL

Should You Get Rid of Windows 7 and Server 2008?

What If You Don’t Switch?

On January 14, 2020, Microsoft will end its support for Windows 7 and Server 2008. But just because you can continue to use Windows 7 after the end of life date, it doesn’t mean you should. Businesses who rely on technology to keep them running are proactively upgrading their Windows environment to avoid downtime, user issues, loss of functionality with other applications and increased security vulnerabilities. Continue reading

How the Bad Guys Get Your Passwords

Password thiefPasswords are an essential part to your businesses cybersafety. If, like the rest of us, you have dozens of passwords to remember, you might take shortcuts. Taking advantage of this type of attitude is one way bad guys access your passwords. Continue reading

14 Ways to Find Any Email Address in 10 Minutes or Less

There are many ways to reach out to your potential client and initiate a connection.  Aside from setting up a meeting in person, sending emails often makes it to the top of the list. Obtaining email addresses, however, is not always a walk in the park. This is especially common in sales-driven jobs or those in communications. Continue reading

Facebook is for Sharing, Not For Long Term Storage

When was the last time you held an actual photo album or actual prints of photographs in your hands? Maybe you look back at older photographs only when Facebook reminds you of a pic from a few years back. If so, you may be risking your visual history. Continue reading