Recent Posts
Aug 17, 2022
SMB Guidelines for Protection from Ransomware
It’s all about the money. Cyber criminals are not letting up with the ransomware attacks. Whether in your personal or
Read MoreAug 16, 2022
Manually Update Zoom for Mac – Now
It is imperative that we keep our technology up to date and patched to protect against discovered vulnerabilities. The Verge
Read MoreAug 11, 2022
Google Pressures Apple to Use RCS Protocol
As reported by The Register, most of the mobile communications world uses Rich Communications Services (RCS) for text messages, but
Read MoreAug 10, 2022
Printers Are Network Access Devices Too
Essentially, a modern day printer is another computer device connected to your network. That means it’s a potential access point
Read MoreAug 09, 2022
Get Rid of the Focused Inbox for Outlook
Several years ago, Microsoft implemented the “feature” of a focused Inbox for Outlook. The intent is to keep all of
Read MoreAug 04, 2022
New Version of Winamp Available for Download
Believe it or not, there is more to life than streaming music over the internet. Back in the day, users
Read MoreAug 03, 2022
Attackers Shifting Away from Using Microsoft Office Macros
A mark of success is the ability to be flexible. Microsoft has decided to turn off the ability to execute
Read MoreAug 02, 2022
Uber Receipts Can Kill Microsoft Outlook
As the story goes, it hurts when you beat your head against a wall. If you want the pain to
Read MoreJul 28, 2022
Ransomware Resource: No More Ransom
It is crazy scary how fast ransomware attacks are growing. There are many things you should be doing to help
Read MoreJul 27, 2022
Change Your Default Search Engine to DuckDuckGo
We really don’t know what information software is capturing about our activity. Facebook got caught with its pants down with
Read MoreJul 26, 2022
Recent Windows Update May Break USB Printing
Life is full of inconveniences. Bleeping Computer reports that some users may experience problems with USB printing after applying a
Read MoreJul 21, 2022
Can You Name Your Wi-Fi Networks Using Emojis?
It’s a good security practice to name your Wi-Fi network with something that does not give a clue as to
Read More