Blog

A keylogger found in HP laptops

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software […]

Gmail gets more add-ons!

Gmail gets more add-ons!

Add-ons and swim rings share one thing in common — they both can save your life! While it might not be literal in the case of the former, add-ons do heaps to streamline your everyday tasks and literally save you hours of work. If you use Gmail, you can experience it today! Google’s focus is […]

Identity and Access Management 101

Identity and Access Management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer. What is IAM? Identity and access management is a system […]

5 Types of virtualization

5 Types of virtualization

The age-old proverb “There’s more than one way to skin a cat” is especially relevant when budgeting for IT services. With the right technology consulting and support, any business can afford customized solutions that employ creative methods to achieve its end goals. As just one example, let’s review all the ways you can use virtualization […]

Facebook Messenger: What’s New?

Facebook Messenger: What’s New?

Over 330 million consumers connected with small businesses via Facebook Messenger in 2017 alone, so it’s evident that the ‘phone call’ era is coming to a close. Since consumers now want constant, immediate online connectivity with their local car dealership, pizza joint, and other local businesses, it is only fitting that Facebook Messenger’s latest feature […]

How to master Microsoft Office!

How to master Microsoft Office!

Despite Microsoft Office’s easy-to-use interface, mastering all the features in this suite of productivity tools requires time. But fret not, the following training videos will help you become a Microsoft Office expert fast. Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality. Intro to Office Basics […]

Cybersecurity Essentials: VPN

Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, a VPN is a group […]

Key points from Protenus’ new report!

Key points from Protenus’ new report!

In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in healthcare. Here are a few key takeaways. Insiders are a bigger threat than hackers Protenus is one of the largest security vendors for electronic health records (EHRs) and their mid-year review sheds some important light […]