What do the celebrity photo leaks, DropBox’s password security breach, and nearly all of the most recent high- and low-profile security breaches have in common? Passwords Management. These data breaches began with cracking users’ passwords. Passwords are...
If there’s any experience that’s universally shared by the modern worker, it’s the sensation that there aren’t enough hours in the day. Fortunately, there are some habits that can be developed that can help to mitigate these feelings by enhancing productivity. For...
Here’s something computer users wherever they are have in common: cords, wires and adapters sitting in a drawer or cupboard, doing nothing more than take up space. Is that you? Of course it is. Old or broken devices are replaced, the new one has its own cabling...
Since the 1990s, computer users have been accustomed to saving their files to the ‘My Documents’ or ‘Documents’ folder on their PCs and Macs. Though these file locations are a useful part of the computer’s local system, it’s time to...
Most businesses rely heavily on their technology resources – so you need to know exactly what those IT resources are. Best practice is to maintain detailed documentation about your IT systems and their support history. Managed service providers document your...
Phishing attacks have been around since 1995 when scammers would pose as AOL employees and request a user’s billing information through instant messages. Today’s email phishing attacks trick users into handing over personal information of all kinds....