The Biggest Vulnerabilities that Hackers are Feasting on Right Now

The Biggest Vulnerabilities that Hackers are Feasting On Right Now

Software vulnerabilities are an unfortunate part of working with computers. A developer works hard to put out a software release with millions of lines of code. Hackers then look for loopholes that allow them to breach that code. Continue reading

How To Reduce Your Risk When You Lose Your Mobile Device

What You Should Do to Reduce Risk When Your Mobile Device Goes Missing

Few things invoke panic like a missing laptop, smartphone or tablet. People rely on these devices and they can also contain files, personal financials, apps, passwords, pictures, videos and much more. Continue reading

6 Discontinued Tech Tools You Shouldn’t Be Using

Discontinued Tech Tools

The one constant thing about technology is that it changes rapidly! Things that were once shiny and new can now be ancient and obsolete. New versions replace those old obsolete tools and the continued use of old technology can leave computers and networks vulnerable to attack. Continue reading

What Is Smishing?

What Is Smishing

You probably now receive a lot more text messages today from companies that you did a few years ago. This is due to businesses trying to bypass full inboxes. Retailers have joined the trend and are urging customers to sign up for shipping alerts via SMS. The medical industry has also joined the trend with doctors and dentists sending out SMS appointment reminders. Continue reading

Laptop Battery Saving Tricks

Laptop Battery Tips

One of the big positives of laptops is that you can use them anywhere as they don’t need to be constantly plugged in. When you first buy the laptop, it will have a good battery life, but as the years go by that lifespan will get shorter. This can be due to a lack of PC maintenance or the type of environments the laptop is subject to (ie extreme heat and cold). Continue reading

What form of MFA Is The Best?

2FA / MFA Issues

With a lot of business processes now largely cloud-based, compromised passwords are the quickest and easiest way for bad guys to exploit computer systems. So how can you protect your online and offline accounts and data? The best way is with multi-factor authentication (MFA). See our blog article on Why Multi-Factor Authentication is Important.  Continue reading

Help, I dropped my laptop! – What now?

Laptop damaged

Dropping your laptop is never a good thing but it does not always lead to serious damage as it will depend on the following factors:

  • how hard and far it fell;
  • whether it was running at the time of the fall;
  • what kind of surface it fell onto;
  • the type and size of the laptop;
  • whether you have a mechanical hard drive or a solid-state drive;

Continue reading

Boost Productivity With Multiple Monitors

Dual Monitor Setup

Using two or more screens on your computer is no longer reserved for specialised jobs or computer geeks. Having additional displays can benefit anyone, even office users can benefit greatly by using the extra screen space. Continue reading

6 Things Not To Do On A Work Computer

Things not to do on a work computer

Whether you work remotely or in an office, there is a fine line between personal and work tasks on a company computer. Like a lot of people that are in front of a computer for most of their work day, it is not unusual to get attached to your desktop laptop or PC. Continue reading

Understanding the Cost of IT Downtime

Costs of IT downtime

Business downtime can be costly and there is plenty of research that show just how much it can set a business back. Some small businesses can not even bounce back  due to the costs involved with an extended downtime. My latest blog article outlines the many expenses a business can encounter as a result of downtime. Continue reading