Page 1 of 4  > >>

Apr 21, 2015

If you are like me, you may find yourself over- or under-capitalizing from time to time. One of my favorite keyboard shortcuts in Word is the Change Case shortcut. Read on to learn how to use this cool feature.

Apr 14, 2015

Your iPhone knows where you are all the time—even when and where you sleep! But it may come as a surprise that with your permission, your iPhone will let anybody know this information. Read on to learn how to take control of your location privacy on your iPhone.

Apr 7, 2015

Are you sick of memorizing dozens of long and complex passwords? Are you tired of frequently changing those passwords only to memorize them all over again? Escape the password nightmare by using a password manager. Read on to learn how.

Mar 24, 2015

Just between the Ctrl and the Alt keys is a powerful tool that goes unused on many workstations - the Windows key. Far from being a mere decoration, it is the first step to some of my favorite and most useful keyboard shortcuts. Read on to learn how to unleash the power of the Windows key. 

Mar 17, 2015

The best way for criminals to hack your bank accounts, raid your private information, and steal your identity is not some sophisticated password cracking software. The best way for thieves to circumvent your security is to trick you into revealing your passwords, account numbers, Social Security numbers, and other private information voluntarily. This practice is called “phishing” (pronounced “fishing”), and it is far more common than you may think. Read on to learn how to recognize the signs of a phishing attack and avoid getting hooked!

Mar 10, 2015

There are two types of people in the world: those who back up, and those who lose data. Studies show that 30% of people have never backed up their data. Do you back up all of your data? Are you sure? Read on to learn how to make sure your important documents and precious memories don't get lost forever.

Feb 24, 2015

When was the last time you saw an address book or a Rolodex? Many people can't remember the last time they looked up contact information on paper. So why do we insist on sharing it that way? Check out this month's tip to learn a better way!

Feb 17, 2015

July 14th, 2015 is the end of the line for Microsoft Windows Server 2003. On that day, Microsoft will stop supporting and, more importantly, stop patching the 12-year-old server operating system. Read on to find out what this means for the thousands of businesses still using this aging server.

Feb 10, 2015

There are thousands of malicious websites designed to steal your passwords and trick you into installing garbage software on your computer. These sites look reputable and trustworthy; they may even look exactly the same as your banking website or your social network. How can you tell the difference between the good and bad?

Jan 13, 2015

A picture is worth a thousand words. Screen shots are a great for making instructions, quickly capturing something to remember, or showing IT just exactly what happened. Learn how easy it is to let the picture do the talking for you.

Jan 8, 2015

2014 is in the books; 2015 is here. The New Year is the perfect time to change the way you use technology and make your digital life more secure and productive and take advantage of all the exciting new possibilities available today! Follow these five resolutions to make 2015 your best digital year yet.

Jan 6, 2015

Are you ready to take advantage of the benefits of cloud storage for your business, but afraid of losing control of your sensitive corporate data?

Sep 11, 2014

Are you ready for a new phone?  On Tuesday, September 9, Apple announced the latest editions of the iPhone in a two-hour live Internet event broadcast to millions of viewers, introducing new sizes, new features, and even an entirely new product.  Don’t have time to watch a 120-minute Apple presentation?  We’ve got you covered!  Read on to get all the details you need in just six minutes.

Aug 28, 2014

Do you want to move to the cloud? Businesses all over the world are leveraging the power of the cloud to increase efficiency and cut costs at the same time.  However, cloud aspirations are often derailed because a company tries to move too much, too fast.  If you want to turn the cloud into your competitive advantage while avoiding the overwhelming complexities, costs, and pitfalls of a massive migration project, consider a different approach: move to the cloud one piece at a time! 

Aug 5, 2014

My laptop is giant.  I have a 17” MacBook Pro that weighs in at a hefty 6.6 lbs.  I am not alone; the average laptop weighs between three and six pounds.  Add as much as one pound for your power brick, and you’re looking at some serious mass.  People are plagued by these cumbersome devices at home and at work.  After all, there is no way we could be productive without our laptops, right?


Maybe there is a way. Continue reading to find out if you can finally get rid of your giant laptop.

Jul 31, 2014

Hacking a computer and stealing information is not as easy as it looks in the movies. The major security breaches reported in the news over the last several months make information theft seem easy, but there is still a high level of skill and commitment required to pull off a hack. Cracking a truly secure password is still extremely difficult, and a properly secured computer looks like a fortified castle armed with hundreds of guards and surrounded by a moat.

You, however—you are the gatekeeper. You’re walking around with keys like passwords, access rights, and knowledge. Malicious people want these keys, and they will use your own fear of security breaches to get them.

Jun 10, 2014

What is your favorite app? Smart phones and tablets are everywhere and they’re so cool. If you are like me, you may spend more time on your phone and tablet than you do on a conventional computer. It is the only computer I have with me at all times and I love it! So what makes it so cool? Sure, I need to give some credit to Apple; Google and Microsoft for creating the base operating system and an ecosystem for the devices but what makes my phone so fantastic are the Apps. As a technology professional, I am often asked what Apps I use most. I thought that it would be beneficial to put together a list of apps that our staff members use on a regular basis. We all have our favorites, the apps that we could not live without and do something amazing. Here are some of ours.

Jun 5, 2014

We are being swallowed in an ocean of passwords. Our digital lives are littered with hundreds of accounts, each password protected. These passwords protect everything from access to our banks, email addresses, social networks and even our fantasy sports teams. If you are like most people, you have between 1 and 5 different passwords that you use for everything. Security experts have been shouting, from the rooftops, for years about the importance of creating strong, unique passwords for every one of your digital accounts. Who has that kind of brainpower? Is it really practical to expect somebody to memorize 50 to 100 randomly generated strings of letters, numbers and characters? Even if we could all channel our inner elephant and comply, security experts then expect us to change our passwords every 60 to 90 days. The Heartbleed Vulnerability, that potentially exposed the passwords used by 70% of the Internet’s webservers, is good example of why that is important. As humans, our brains are just not built for this kind of complex memorization. Passwords are important, but how do you remain secure without losing your mind?


Apr 11, 2014

How often do you check your email? Every day, every hour, if you are like many, your email application sits open and visible every minute of every day. Email, Instant Messaging, Text Messaging, Cell phones, social media, and the trusty old desk phone make it possible to be available and connected every minute of every day. This has made the expectation of an immediate response stronger now than ever before. You may be one of the super doers who immediately responds to every email, has an inbox that is always tidy, is connected on every device they own and checks your email both first thing in the morning and last thing at night. People may be in awe of your prowess and envy your skills. Surly there is no downside to this level of ultra-responsiveness, right?

Apr 10, 2014

The world is buzzing with reports of the recently discovered Heart Bleed Bug.  This bug could be the widest spread internet vulnerability ever discovered. What is Heart Bleed? What does Heart Bleed affect? What do you need to do now and in the future to be protected? Here is what you need to know about Heart Bleed.

Mar 3, 2014

Believe it or not, even the largest and most well known companies make mistakes occasionally. Late last week Apple announced that it had found a security hole in its iOS and Mac OS X software. If you are using an iPhone, iPad, iPod, or Mac computer to connect to the Internet, you need to be aware that your information could be vulnerable. Apple released an update for iOS within a few days and a fix for Mac OS X came shortly after that.

Feb 21, 2014

Everybody is talking about the Cloud.  Do you ever feel left out, afraid that your organization is the only business left on the planet not in the Cloud?   Maybe your company is in the Cloud but you are wondering what all the fuss was about.  Do you find yourself asking the question “Why should I move to the Cloud, everything is fine”?


The Cloud is here to stay and it’s changing the technology landscape in ways that have not been seen since the explosion of the Personal Computer back in the 70’s and 80’s.  Should you move your business to the cloud?  Here are three common business technology issues and how you can use the cloud to resolve them:

Feb 11, 2014

There is a lot of talk about Net Neutrality these days. Some say that without it, the free flowing Internet as we know it will become history. Others say that it goes against everything the free market is built upon. Both are bold statements, but what is Net Neutrality, and how does it impact your everyday life?

Jan 12, 2014

You may have heard of Bitcoin recently. Bitcoin could very well be the currency of the future. It could also be another flash in the pan that goes away just as quickly as it came. Either way, here is what you need to know right now.

Dec 30, 2013

If you think that you don’t have anything important to steal and that makes you safe from hackers - think again! “All of your files have been encrypted, unless you pay $300 -$700 US Dollars in Bitcoin in the next 100 hours you will never be able to decrypt them”.  This is the summary message that is displayed on a Malicious Software program called CryptoLocker that is burning through the Internet like wildfire.