• Should Your Business Outsource IT Operations?

    Should Your Business Outsource IT Operations?

    There never seem to be enough hours in the day to get everything accomplished, and that goes double for small business owners. When you’re top dog in charge, every small problem or frustration heads your way. Technology support is one of the key complaints from staff members, especially when there are problems with slow network […]
  • How To Remove Microsoft Office Metadata?

    How To Remove Microsoft Office Metadata?

    This article covers the definition of metadata and how to view, manage and delete it in Microsoft applications. What is Metadata? Metadata is information about your data. It contains facts that can’t be disputed, the same way data does. Here is an example from Microsoft Word. Let’s say you’re writing a letter to a co-worker. […]
  • What Is Managed IT Services & Who Provides Services

    What Is Managed IT Services & Who Provides Services

    As managed IT services have grown in popularity, you’ve probably heard the concept touted often as the answer to your business’s IT woes. Still, there can be plenty of mystery on the topic. What is managed IT services, exactly? How do organizations integrate managed IT services into their existing business and workflows? Also, who provides […]
  • Tech Competence and Attorneys: New Changes You Need To Know About

    Tech Competence and Attorneys: New Changes You Need To Know About

    If you are a lawyer or if you are hiring a lawyer, technology competence, often shortened to tech competence, is a term that you should be aware of. Recently, changes have been recommended in regards to tech competence and attorneys. Here is everything that you need to know about this topic. What is Tech Competence? […]
  • Spoofing & Hacking: What’s The Difference?

    Spoofing & Hacking: What’s The Difference?

    Most people know not to open email attachments from senders that they do not know. Unfortunately, it is not just attachments from strangers that you have to be on the lookout for. It happens quite often that people will get emails that seem to be from known senders that have malicious attachments, or that ask […]
  • What Is Technology Competence

    What Is Technology Competence

    According to the LawSites blog, as of this writing, there are 36 states that have adopted the ABA’s updated Model Rule 1.1, which states that lawyers should maintain technology competence. The rule is purposefully vague to allow for the constant changes in technology that the legal industry is encountering. Unfortunately, the vagueness can create some anxiety […]
  • How to Make Calls with Amazon Alexa

    How to Make Calls with Amazon Alexa

      Did you know you can use just about any Amazon Echo device to make phone calls for free? You can do the same in the Alexa app on iOS or Android, whether or not you have an Echo device. You can also call others in your contacts on their Echo devices instead of their […]
  • Cutting These Two Corners Could Lead to Business Disaster

    Cutting These Two Corners Could Lead to Business Disaster

    Cost-cutting measures are not unusual for organizations as they traverse the standard lifecycle of products and services. What you decide to cut during the lean times can have just as much impact as to where investments go when your business is flush with cash. Some organizations start their cuts in advertising and marketing but eventually […]
  • Google’s New Chrome Extension Gives Your Passwords a Checkup

    Google’s New Chrome Extension Gives Your Passwords a Checkup

    In early 2019, white-hat security expert Troy Hunt and other researchers shared a massive database of breached passwords and usernames. The stolen data constitutes 25 billion records and 845 gigabytes of stolen data. While many of the collected records are from previously reported thefts, there are new records there, too. It’s a clear indication of regularity, scope and potential damage […]
  • Important Warning From The FBI

    Important Warning From The FBI

    Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that a site is secure) when sending potential victims phishing emails that imitate trustworthy companies or email contacts. […]
  • Burlington, ON Phishing Scam Steals More Than Half A Million Dollars

    Burlington, ON Phishing Scam Steals More Than Half A Million Dollars

    The City of Burlington is out $503,000 because a staff member fell for a phishing scam. After receiving an email request to change banking information, the staff member was tricked into making a transaction to a false bank account. The email requested that the employee change banking information for someone the City was already doing […]
  • Happy Father’s Day!

    Happy Father’s Day!

    June 16th is Father’s Day, a great reason to spend a little quality time with the family doing a few of Dad’s favorite things.   Whatever your plans are, take some time this Sunday to let Dad know how much you appreciate everything he’s done for you over the years, and how glad you are […]