Blog

March 26th, 2014

Office_Mar24_AMicrosoft Outlook is an application included in the Microsoft Office Suite. While it’s most commonly used to access different email accounts e.g., personal and business, it also has other features, including calendar, contacts, and tasks. It also comes with a search folder that lets you instantly find messages that fall under certain criteria.
Read more.

March 20th, 2014

Security_Mar17_ASecurity of a business's systems and networks should be important to many business owners and managers. In fact, an increasing number of companies are implementing security strategies. While these strategies do keep businesses secure, there is one critical element that could cause plans to fail, leading to an increased chance of a breach of security: The audit.

Auditing and the security security strategy

Auditing your company's security is important, the only problem business owners run across is where and what they should be auditing. The easiest way to do this is to first look at the common elements of developing security strategies.
Read more.
Topic Security
March 20th, 2014

Hardware_Mar17_AIt’s hard to imagine printers completely disappearing in offices. While no one can refute how most documents are now housed in the digital realm, there will always be a need to have these documents printed out for one reason or another. While offices do have printers, it may be confusing to pick a new printer when you need a new one.
Read more.

Topic Hardware
March 19th, 2014

BCP_Marc17_AA business without a DRP (Disaster Recovery Plan) is like a circus acrobat without a safety net. The question is, are you willing to take that kind of a risk with your business? Considering how attacks to your business can come in many forms be it cyber, natural disaster or man made (among many others), it makes perfect sense to have an effective DRP in place.
Read more.

March 12th, 2014

Windows_Mar10_AWindows is the most popular operating system in use today, with many businesses relying on it as their main system. Windows, along with the apps and programs used with it can sometimes be time consuming to navigate or even find, especially if you have a large number of icons on your desktop. In an effort to make things quicker, many programs use keyboard shortcuts but, did you know that you can use keyboard shortcuts to open programs on your desktop?
Read more.

March 7th, 2014

Productivity_Mar03_AAre you looking for a tried and tested way of increasing your productivity? If so, then there are a number of solutions. One of the most effective is writing a to-do list to help you really get on top of your day-to-day tasks.This guide will help you craft an effective one so you can skyrocket your productivity each day.
Read more.

Topic Productivity
March 6th, 2014

Security_May03_AKeeping systems and computers secure can seem like a full time job, largely because there is a near constant stream of security issues being discovered. From malware to bugs in software, you can bet that you will eventually find a security breach in your systems. The other week news broke of a bug that posed a critical security flaw in Apple's operating systems.

About the bug

News broke on many security websites mid-February about a potentially critical security flaw in Apple's systems following the company releasing an update to their mobile operating system, iOS.
Read more.
Topic Security
February 26th, 2014

Office_Feb24_AMicrosoft Office (MS Office) is a popular and top-selling software suite that features a myriad of publishing programs for desktop computers. Basically, it comes with an array of applications that can help you document everything needed in your work, studies or business. As a user, you have the option to choose from several different suites intended for home users, small business enterprises and large corporations - all depending on your needs. While this program is user-friendly, there are times when people need help with it.
Read more.

February 20th, 2014

Security_Feb17_AThere are numerous ways business security systems can be compromised. A common way is phishing - tricking people into giving up important information via email. Original phishing methods are now well known, and increasingly less effective. So hackers have become more skilled and have adapted their phishing methods into a new form of catching people out with what experts have labeled as spear phishing.

What is spear phishing?

Spear phishing is a specialized type of phishing that instead of targeting a mass number of users, as normal phishing attempts, targets specific individuals or groups of individuals with a commonality e.g., an office.
Read more.
Topic Security
February 20th, 2014

Hardware_Feb17_AAccording to statistics, about 64% of American adults, business owners included among them, own their own laptops. That’s a huge increase from 2005 where the numbers were only at 30%. Considering how much value that laptops can bring to the table, it's imperative that we get to know the device better so we can maximize the benefits of having one.
Read more.

Topic Hardware