Monday, February 23, 2015

Embracing The Age Of Mobility & The BYOD Workplace

In today’s always-connected world, the time-honored separation of work and personal time is quickly disappearing.Mobile devices such as laptops, netbooks, tablets, and smartphones have fundamentally changed how all of us live and work.

In this post, we will examine the pros and cons of BYOD and outline five safe BYOD practices to ensure a safer and smoother transition into this age of mobility.

Monday, March 25, 2013

iPhone - Make a Mistake... Just shake it

New to iPhone, made a mistake typing, deleting, cutting, or pasting and wondering how to undo it? While you might have already figured this out through unbridled frustration. If you've been editing some text and you either typed the wrong thing, deleted more than you intended to, or cut, copy, or pasted yourself into error-land, here's what you do:

Friday, March 22, 2013

Staying safe and minimizing risk while using social media

Do your friends make questionable decisions on social media? Yes, because many of our friends actually help scammers share their message, many because they are not well-informed. But just in case you’re in any doubt about how important it is to proceed with caution on social media, consider these three factors:

Friday, January 11, 2013

Three suggestions for 2013

The new year has begun, and we have three suggestions for improving the quality of your computing life in 2013.

Thursday, January 10, 2013

Turn off Java for security reasons

Is Java turned on in your web browser? If your answer is "Yes" or "I'm not sure" then it's time to take action. Right now, cyber-criminals are aware and exploiting serious security flaws in Java that could lead to your computer becoming infected by malware.

Wednesday, September 5, 2012

Technology Fuels Cyberbullying

Gone are the days when a child’s home is a refuge from playground or neighborhood bullies. The Internet is the new playground, and there are no off-hours. Tech-savvy students are turning to cyberspace to harass their peers using a new method of bullying—cyberbullying.

Wednesday, August 29, 2012

Don't Get Caught with Data Loss

As Isaac threatens landfall, there’s no doubt that many of the areas business owners are concerned. They’re worried about safety of their family and that of their employees, first and foremost. And they’re worried about damage to their buildings and vehicles. But many should also be concerned about their data... customer information, sales records, payroll and budget information, and everything else they keep on their computers.