Useful features on the new Outlook.com

September 12th, 2017
Useful features on the new Outlook.com

Are you looking for a business email service provider? A convenient option would be Gmail, which lets you sync your emails easily with Google applications. But if discreet ads, a cleaner design, increased storage, and other productivity enhancements sound appealing to you, we recommend taking a look at the following new Outlook.com features. Easy elimination […]

Protect yourself from this Facebook threat!

September 11th, 2017
Protect yourself from this Facebook threat!

When you receive an email from an unfamiliar source urging you to click on a link or download a file, it’s easy to send it straight to the bin due to its spam-like nature. It’s a completely different story when the message is sent via Facebook Messenger by one of your friends. Such is the […]

Useful tips on reducing your IT budget

September 8th, 2017
Useful tips on reducing your IT budget

It may not seem as though your printing infrastructure is costing your business a great deal. But if left unmanaged, you could end up with an overinflated IT budget dominated by equipment maintenance and hardware and supplies purchases. Here are some ways to avoid that. Replace outdated printers Outdated and cheap printers may be functional, […]

How to use OneNote like a pro

September 1st, 2017
How to use OneNote like a pro

Almost everyone loves PowerPoint, Excel and Word, but there’s another Office application that should be recognized as a must-have: OneNote. It’s an app for pulling together text, video, audio, and other visual resources to create shareable notebooks full of useful information. With this article, you can master OneNote in no time at all. OneNote is […]

Locky-type ransomware is attacking systems

August 30th, 2017
Locky-type ransomware is attacking systems

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers. Quick facts According to […]

The values of Amazon AppStream 2.0

August 28th, 2017
The values of Amazon AppStream 2.0

Today’s workforce is no longer confined to office walls. People work from home, while they’re commuting to and from work, and even on vacation. This is made possible thanks to remote access solutions, and Amazon’s powerful web features. Here’s what you need to know about this powerful application streaming service. What is it? Initially released […]

What can users expect with Microsoft Edge?

August 25th, 2017
What can users expect with Microsoft Edge?

People prefer one web browser over another for all kinds of reasons, including ease of use, applications, security and of course, performance. If you’ve recently downloaded Windows 10, there’s a new browser on the block: Microsoft Edge. Here are some nifty features you may find useful. Import favorites You can easily import the list of […]

Don’t let your old PC go to waste!

August 24th, 2017
Don’t let your old PC go to waste!

When smartphones first outsold PCs in 2010, people no longer have to put up with slow and bulky computers to do business. This comes as no surprise why many stashed their aged PCs away. But there are ways to breathe new life into your ancient laptop and computer, so if you haven’t trashed them, it’s […]

Microsoft adds new Office 365 apps for SMBs

August 18th, 2017
Microsoft adds new Office 365 apps for SMBs

There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses. Microsoft Connections Email marketing campaigns are a great way to build relationships […]

It’s time to redefine the word “hacker”

August 16th, 2017
It’s time to redefine the word “hacker”

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat […]