Companies rely more and more on digital information and network-enabled devices. Threats are increasing, and cybercrime is on the rise, so it's no wonder cybersecurity is increasingly important. Is your company prepared for a cyber attack?
"Phishing" is a social hacking attempt to get you to reveal information that hackers can use to exploit your email or computer account. Here are some clues on how to detect a phishing attempt and what you should be looking for.
We've all come to rely on online meetings to stay connected with business associates, remote learning for our children, and keep in touch with our loved ones that we can't visit in person.
That's why in this first episode of my video podcast, I'm going to show you how to diagnose and repair one of the most popular tools for online meetings: Zoom. In addition to going over troubleshooting and repair steps for your sound, video, and microphone problems, I'll also show you how to change your name's appearance in Zoom calls.
You can watch by clicking the video or scroll down if you prefer to read and view the relevant screen shots.
If you are using a laptop on a slow wireless connection such as hotel WiFi or a cellular hotspot, your connection can slow to a crawl if you have installed cloud services such as DropBox, Google Drive, Microsoft's One-Drive. Here's how to limit how much resource the service uses, so you have room to do other things on the internet.
Individuals and small businesses struggle with ways to increase the lifetime value of their PC hardware. What can you do to keep your computer running strong like you?
When an Internet Service Provider (ISP) installs internet access in your business, you are usually provided with a router/firewall combination. Do you need to invest in a commercial-grade firewall, or is the ISP's firewall sufficient?