While you might have managed a couple of team members remotely to date, managing a fully remote team, while balancing the challenges of being remote yourself, might be a new experience for you. The following are some best practices to help guide you through it.
In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.
The California Consumer Privacy Act is designed to educate and protect California consumers about personal information that is being collected and sold, primarily by large, California companies.
Only 66% of working adults correctly answered the question “What is phishing” in 2019 Proofpoint survey. This means one-third of adults do not know that phishing is a form of fraud in which cybercriminals try to scam people into providing sensitive information (e.g., login credentials, account information) or performing an action (e.g., clicking a link, opening an email attachment) in…
Microsoft will no longer support many business apps in 2020 because they are reaching the end of their lifecycles. Find out which popular programs are reaching this point so you can plan any needed upgrades and adjust your 2020 IT budget accordingly.
Microsoft Edge has several features to manage auto-play clips. For starters, Edge is designed to automatically silence these clips on background tabs — in other words, on web pages that are open but not currently being displayed. (Their tabs are greyed-out.) Edge also lets you mute auto-play clips on individual web pages as well as stop clips from running automatically…
Apple has rolled out the new iPhone 11, but many iPhone users are wondering whether its enhancements are worth the cost of an upgrade. Here is how the phone compares to its predecessor.
Cybercriminals commonly use compromised passwords in cyberattacks. For example, in ransomware attacks, compromised passwords have now surpassed phishing scams as the No. 1 way to gain access to the systems in which the ransomware is planted, according to F-Secure’s “Attack Landscape H1 2019” report. And compromised passwords is No. 2 on hackers’ list of tools to use to gain access…
I am so excited about OneDrive, my cloud-based file sharing and storage application. Accessing it is as easy as logging into Office.com on my home computer or opening the OneDrive app on my work computer or phone. And now that I’ve been using it a while, I can’t imagine using anything else – it makes my life easier and allows me…
Xantrion’s cybersecurity program takes a risk based approach to preventing, detecting and recovering from a potential ransomware attack. We provide multilayered protections which consider the various methods criminals might use to penetrate a client’s network and protect against each of these attack vectors. We monitor client systems so that, should compromise occur, it can be quickly detected and shut down. Even…
In a study conducted by Microsoft and YouGov, more than 14,000 people in seven countries shared their views on collaboration and the tools they use to achieve it. The results reveal three insights that can help you cultivate a collaborative workforce: 1. Different Generations Prefer Different Collaboration Tools The Microsoft-YouGov study found that the collaboration tools people use most often…
Microsoft Word and Excel have been around for a long time, so they have many features, including more than 200 keyboard shortcuts. Using these shortcuts can save you time because you just need to press a combination of keys to perform an action. While trying to remember every single shortcut is impractical, it pays to learn the shortcuts for operations…
While there are many services that fall under cloud computing, businesses often use the cloud to store data. Although security experts note that storing data in the cloud is a relatively safe practice, businesses should still take certain measures to protect their files. Here are five things you can do to help keep your business’s data safe in the cloud:…
The number is eye-opening: 83% of companies believe that employee errors have put sensitive business and customer data at risk of exposure, according to a study by Egress. More than 1,000 security professionals at US-based companies participated in this study. The study also identified the technologies that most often involved in this type of accidental data leak. Email services provided…
It is common for people to have multiple apps that perform the same function on their Windows 10 computers. For instance, people might have several web browsers or email apps. Similarly, people often can open certain types of files with more than one program. For instance, they can open PDF files with a web browser such as Google Chrome or…
If your iPhone is running iOS 11 or later, you can use it for more than just staying in touch with the office. Here are 3 features you can use to help your business trip go more smoothly: 1. Check a Flight’s Status If you are traveling by plane, you can use your iPhone to check your flight’s status before…
The fate of the desktop computer has been the topic of debate for several years. Knowing both sides of the argument can be beneficial when you need to purchase new computing devices for your business. Why Some People Believe the Desktop Computer’s Days Are Numbered Some people believe it is only a matter of time before desktop computers become obsolete,…
While regular backups are an important part of any disaster recovery plan, not every file on your system is mission critical. It’s always good practice to back up your systems daily, but often that isn’t practical or doable. Whether because of financial or time constraints, full backups often have to be done less frequently. So which files should you backup…
Google is tracking the whereabouts of billions of its customers, even when they tell the tech giant not to. Here is what you need to know about this practice, including how to minimize the amount of data being stored about you. What the Commotion Is and Isn’t About When people use Google’s apps and services, the company collects data about…
If you use the Internet regularly, you have probably encountered them — those pesky boxes that pop up when you visit a website for the first time and it wants to send you notifications. Fortunately, it is easy to stop these notifications from appearing if you use the Google Chrome web browser. Open your browser and follow these steps: Click…
You can use many of the same keyboard shortcuts when working in Google Chrome, Microsoft Edge, and Mozilla Firefox web browsers. Here are 10 keyboard shortcuts that are handy as well as easy to remember: 1. F3 Pressing F3 in Chrome, Edge, and Firefox opens the search box so that you can search for text on a web page. Once…
Ever since laptops first came on the market there have been challenges reliably backing up the data to protect against loss or failure. The reality today is that laptop backup solutions are still not flawless and shouldn’t be exclusively relied on to limit the risks of data loss or corruption. For example: Manual backup (for example to USB) suffers both…
To understand what is meant by the term “digital transformation”, it is helpful to know what it is not. If a company simply moves applications to the cloud, upgrades its IT infrastructure, or implements some other one-off IT project, it is not digitally transforming itself. Digital transformation involves more than just adding new digital technologies to business operations. It requires…
Business professionals often spend a lot of time reading and responding to emails. If you are one of them, follow the 5 tips below to reduce the amount of time you spend dealing with emails. 1. Read and Respond to Emails Only at Designated Times When you get a notification that an email has arrived, what do you do? If…
Subscribe to our newsletter and get the latest IT tips.