Blog

Secure your passwords now

Secure your passwords now

For years, we’ve been told that strong passwords include three things: upper and lower-case letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why and how it involves you.

Top productivity hacks for computer users

Top productivity hacks for computer users

We’re all obsessed with finding new ways to become more productive. Business gurus often emphasize the importance of time management and taking breaks to avoid burnout. But aside from motivating yourself to work more efficiently, there are plenty of tools that increase your daily output.

Huge virtualization partnership is now live

Huge virtualization partnership is now live

In a win-win move for virtualization vendors and end-users, two of the biggest names in the industry are making their platforms compatible with each other. Amazon Web Services (AWS) can now host virtual machines that use VMware, and that has huge implications for disaster recovery plans.

Use these little-known Android Oreo features

Use these little-known Android Oreo features

Most Android users know that there’s more to their devices than meets the eye. Business users, in particular, are becoming even more dependent on their mobile devices to make remote work more efficient. With a better understanding of what Android Oreo is capable of, users can better manage their devices, improve workflow, and save their company some time.

Cybersecurity Awareness Program

Cybersecurity Awareness Program

It’s all over the news lately – large companies getting hit with ransomware, or reporting on massive security breaches affecting millions of people: Yahoo, Gmail, Verizon, Equifax, and most recently Deloitte. Company records stolen with the private information of their customers and employees to be bought and sold by cybercriminals on the black market.

Equifax’s Leak: lessons learned

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: Don’t walk in the footsteps of Equifax.