-
1. TextPlus lets you send free, unlimited text messages, and it’s also free. TextPlus is more than a glorified instant messaging app. It brings real SMS to your iPhone or Android, and also has a group-chat and landscape mode for writing. It doesn’t require you to enter your phone number to use the application.(For U.S. […]
-
When your technology fails, your day-to-day operations come to a complete halt. But there’s no need to take risks – Compunet specializes in providing IT Services and Support for various industries. To learn more, give us a call at
(604) 986-8170 or send us an email at
info@compunet.ca. As technology continues to become increasingly complex, your […]
-
Another version of CryptoLocker has just been released by the criminals who created the Australian Electric Company Bill version earlier this week. Except, this version has been improved, with a different mode of delivery. It comes in the form of a plain text email that asks you to click a link to view your fax. […]
-
Our team of IT security professionals would like to draw your attention to a high rate of malicious email traffic containing Cryptolocker malware that WILL encrypt your organization’s data if executed. The majority of this traffic is coming through trusted free file share programs masked as voicemail messages or faxes. Our IT security experts are […]
-
Search Engine Optimization, or SEO, is a collection of tactics that help to rank your business website in the first positions of a Google search. There are many elements to developing a solid SEO strategy, but the following are five tips to help get you going. Link Your Sites. It’s helpful to link your social media […]
-
Our team of IT security professionals would like to draw your attention to a high rate of malicious email traffic containing Cryptolocker malware that WILL encrypt your organization’s data if executed. The majority of this traffic is coming through trusted free file share programs masked as voicemail messages or faxes. Our IT security experts are […]
-
Canada’s Anti-Spam Legislation (CASL) goes into effect July 1, 2014. It is designed to prevent spamming, but it will also impact the way you do business. You must ensure you obtain consent from your customers or prospects before you send emails, newsletters, text messages, software downloads, or other electronic messages. If you don’t, your business […]
-
A new ransomware strain, CryptoWall, is attacking businesses and organizations worldwide. It seems that the cyber criminals who developed the CryptoDefense Ransomware in April 2014, released this strain because CryptoDefense was being blocked by endpoint protection software. Now they’re angry! Beware: CryptoWall doesn’t require you, or your staff, to open it. It uses a new […]
-
Urgent Warning: The Latest Mobile Malware Targets and Encrypts Sensitive Data Stored on Your Android Device! Security researchers discovered another form of malware that targets Android devices. The latest malware, known as Simplocker, is a malicious app designed to encrypt photos, documents, and videos stored on your mobile device. Once your important files are encrypted, […]
-
While Microsoft Excel is a powerful program, it’s certainly not the easiest application to use. But fortunately, you’ve probably spent a significant amount of time getting to know the majority of features available. And there’s still quite a few beneficial hidden features to learn. Here’s 6 tips and tricks to help you save valuable productivity […]
-
Reports in leading newspapers throughout North America state that: Approximately 79% of small businesses don’t. What does this mean for them—and for you, if you don’t? Decreased market share. Higher operational costs per employee. Shrinking profitability. The inability to effectively compete. Did you know that? Businesses that invest in a Sound IT Strategy, outperform […]
-
In the past, tech geeks were the only ones with the ability to successfully hack a business website. But those days are long behind us! Nowadays, it’s fairly simple for almost anyone to hack a business website without much difficulty or effort. In fact, a computer hacker can use a search engine to find all […]