Technology
What Mac Users Should Know About the New Ransomware
Mac users beware, you’re no longer safe from ransomware. The ransomware dubbed KeRanger recently hit Macs, infecting about 6,000 computers before it was caught and shut down. While this isn’t the first virus aimed at Macs, this is the first one that has gotten through Apple’s defenses. The KeRanger ransomware is a Mac version of…
Read MoreKeeping Out Locky Ransomware
“Locky” is the newest villain on the Ransomware scene. Since Hollywood Hospital fell prey to the hackers, the tech world has been on high alert. So how does such a high-profile organization become a victim to ransomware like Locky? The virus disguises itself in a Word document attached to an email. The Word document itself…
Read MoreTen Cool Things You Didn’t Know Your Android Could Do
There are numerous cool things your iPhone can do without adding any apps. But the iPhone has nothing on what your Android phone can do natively. We’ve got the list below to prove it. Ten Noteworthy Things To Do With Your Android Phone Accidentally leave your phone in an uber? Your Android device can display…
Read MoreTen Cool Things You Didn’t Know Your iPhone Could Do
You shouldn’t be surprised that there’s an app for just about everything these days, but you will be surprised by a few of these things your iPhone can do… And these are without an additional app cluttering your screen. Did you know that there’s a hidden level on your compass that allows you to use…
Read MoreSpring Clean Your Technology
There are so many ways technology can make your spring cleaning easier (Roombas, robot cleaning balls, using Yelp to find someone to help you out…), but when it comes to spring cleaning your technology, things get a little more complicated. I like to get a jumpstart on my spring cleaning by planning out the toughest…
Read MoreShould Your Company Invest in a Secondary (Backup) ISP?
In the age of the Web of Things, experiencing an internet-outage in your headquarters can mean that every hour your servers are down, so is the productivity of your employees. After all, without any access to the internet, email, or your website, what work can get done? This is where backup ISP come into play.
Read MoreYour Guide To Social Media Marketing — And How To Stay Secure While Doing It
Social media marketing is a hallmark of just about every marketing campaign run. In this article, we’ll shed some insights, share some resources, and give you some tips for securely managing your social channels. Here’s specifically what we’ll cover. Is One Social Network Enough? Six Ways to Expand Your Message on Social Media Gary Vaynerchuk…
Read MoreMicrosoft Bans Man-in-the-Middle Adware
Microsoft has announced an update to their adware policies on the heels of the Lenovo Superfish scandal. Lenovo recently came under fire when security researchers uncovered Lenovo was shipping out computers to customers with software that injects ads into websites installed. Needless to say, consumers weren’t entirely happy when they discovered this. Software like this…
Read MoreSearch Smarter in Outlook With These Tips
We love sharing cool features your software and tools have that you may not be aware of yet, and Outlook has a lot of them. Anyone can end up wasting a good ten minutes searching through Outlook for just the right email that was sent to them about three months ago… Time they didn’t need…
Read More