Blog

No ransom: A place for free decryption

Although a ransomware attack may seem targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, and the further it goes, the more resources are allocated to fighting it. If your data is held hostage, refer to this list of free decryptors you can use.

How to deal with Android bloatware

When you buy an Android mobile phone, the mobile carrier often installs certain apps onto the device. These apps, commonly referred to as bloatware, are usually tied into a service that the carrier offers. A majority of users, however, don’t want these apps.

4 Common misconceptions about virtualization

Small businesses can accomplish a lot by implementing virtualization in their office IT network. Unfortunately, many SMBs shy away from it because of various misconceptions. Here are four myths about virtualization you should stop believing.
Myth #1 – Virtualization is too expensive for SMBs
Many people assume that the more advanced an IT solution is, the more expensive it is to install and maintain.

What is the risk of using Windows 7 after end of life support?

January 13, 2015 marked the end of mainstream support for Windows 7 or the end of non-critical security updates, design changes, and complementary support for the OS. Currently in its extended support phase for bug fixes, updates, and paid support for businesses, Windows 7 will lose all that support when it enters its end-of-life (EOL) phase on January 14, 2020.

An upgrade to Windows 10, Microsoft’s latest operating system, is recommended.

Why Google now prioritizes mobile searches

Google recently made changes to its search tools to prioritize mobile searches over web searches. Why has Google done this and what does this mean for businesses and users? Get the answers by reading on.

Google search works by using ‘bots.’ These bots are responsible for trawling through the web and sorting and categorizing websites based on the content, location, and other factors associated with the site to give users the most relevant search results.

How to make the most out of your Time Machine

If you’re a Mac user, you probably know that macOS has a built-in feature called Time Machine. This backup application is used to keep an up-to-date copy of all the files on your Mac. What’s unique about it is that it captures exactly what was on your Mac any day in the past, making it easy to recover files, emails, or media that may have been inadvertently deleted.

How to keep your data safe and secure

Data security and privacy should be every small business owner’s top priority in this day when cybercriminals are on the loose. The good news is you don’t have to be a tech genius to make it happen. Here are practical ways to shield your company from cyberattacks.

Tweak your mindset to achieve success on the cloud

The cloud is not like some magic beans that’ll sprout sky-high stalks overnight and lead you to a castle full of riches. Don’t be misled by shiny words such as “increased productivity” and “collaboration” — your organization won’t realize these benefits unless everyone actually puts in the work to make the cloud work. If you want to use the cloud successfully, you might have to change your mind about a thing or two before you migrate to the cloud.

Smartphone browsers now support biometrics

Google Chrome and Mozilla Firefox Lite support web-based biometric authentication. The leading mobile browsers now allow users to sign in to online profiles through fingerprint scanners, facial recognition, and the like. What’s more, online biometric authentication through these browsers requires no additional software.