Blog

Get ready for Chrome’s ad blocker

For the longest time, we’ve been visiting countless websites only to be greeted with annoying ads that never piqued our interest. Luckily, Chrome users won’t have to put up with them for much longer. Google will release an ad blocker early next year. To that end, here’s everything you need to know. What is it? […]

Key features missing in the upcoming iOS 11

Apple users are anticipating the new iOS 11, which is expected to introduce key enhancements that will cater to business users. It’s supposed to close the gap between Apple’s mobile and desktop operating systems, with updates such as Files, drag-and-drop ability, and a lot more that’s aimed at providing a better experience. Unfortunately, several popular […]

Quick review: why you need virtualization

With virtualization, you can make software see several separate computers where there is only one, or make several computers look like one supercomputer. That may sound simple, but it’s far from it. Of course the benefits are well worth it; here are just a few. More technology uptime Virtualization vendors use lots of fancy names […]

MR to be removed from Google search

Google has recently made changes to its personal information policy, including a major one for the healthcare industry. The search giant has begun removing private medical records from its search results, preventing cybercriminals from taking advantage of these resources that were previously available after only a few keystrokes. If an individual’s medical records were leaked, […]

Changes to Office 365

Whether it’s for the sake of aligning with Windows 10, or not, Office 365 Pro Plus will be upgraded twice a year, in March and September. But what does this mean to business owners like yourself? Will the new update schedule affect how Microsoft plans to deliver and support ProPlus in the future? We’ll answer […]

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security. The Wikileaks CIA documents For several months, the notorious website famous for leaking government […]

Get more out of Office 365 with Power BI

The benefits of Office 365 have totally changed the way most businesses operate, and it’s hard to believe anything else could have been added to make it even better. But lo and behold, Microsoft has added another excellent feature for getting a better return on your productivity software investment. What is Power BI? Released in […]

Keep the Cloud affordable with these tips

Despite the Cloud being a powerful and cost-effective solution that many small- and medium-sized businesses welcome with open arms, there are hidden costs that some business owners might not be aware of. It might cost you little at first, but it has the potential to snowball and cost more than your weight in gold. Follow […]

Mobile security threats in Android

Employees today are working under tight timelines, but thanks to bring your own device policies (BYOD), they can access critical files and applications using their mobile device and get work done from anywhere. But BYOD can be a double-edged sword to those not vigilant about cyber attacks. If you’re using an Android device, here are […]