Security Topics 0-Day Security Threat: Mobile Devices using Samsung Modem Chips New vulnerabilities are consistently being found in both newer tech devices and applications, as well as devices and applications that have been around for years. Vulnerabilities can be found in software after changes are implemented or through complementary hardware running the application. Additionally, older applications that are no longer supported
Organizational Tips The Time-Saving Office Shortcuts You Likely Aren't Using Enough The longer you use computers and specific applications, the more familiar you become with useful keyboard shortcuts. Many keyboard shortcuts are familiar, used daily, yet others can be less common and you may have to document them to use later. This post discusses a different type of shortcut that can
Organizational Tips How to Reconnect Outlook When it Fails to Receive New Emails Almost nobody complains that they do not get enough emails. Instead, most people share that they receive more emails than they want or feel like they can manage well. Unfortunately, when email issues happen, they can have a huge impact on your ability to communicate and be aware of issues.
General Topics Why You Can't Bold or Italicize Certain Fonts You've Installed Locally There are so many different fonts to choose from when working on a project but selecting one can be a big decision. There are lots of variations in fonts which is part of what makes choosing one to best fit your project or business so much fun. Fonts can come
Organizational Tips 3 Limitations You Should Consider Before Moving to Cloud Applications Cloud applications and services have become the norm for many of the things we do on our computers every day. There are many benefits to using cloud applications, including lower up-front fees, more frequent updates, and always having the latest version of the software. However, like anything, there are things
Organizational Tips 3 Settings You can Modify to Use Your Mouse More Efficiently Two of the most important tools for every computer, even those with touch screens, are the keyboard and mouse. Using an on-screen keyboard for typing is typically slower than using a physical keyboard for most users. Additionally, scrolling with your finger is easy, but other items like design work or
Organizational Tips Why Older Emails are Missing in Outlook and How to Get Them Back If you use Outlook for email account(s), you may eventually notice missing emails that you did not delete, move, or archive. This is a common complaint with newer versions and especially subscription versions (O365/Microsoft 365) of Office. Luckily, there is an easy way to regain access to these
Organizational Tips 3 Ways to Expand and Shrink Screen Views on your Computer Different monitors support different screen resolutions which are what allows users to customize how items are displayed on the screen. Screen resolution affects how sharp the colors are as well as the sizing of items. Using a lower resolution provides bigger icons and text while a higher resolution provides a
Organizational Tips 3 Things You Can do to Better Organize Data in Excel Pivot Tables When you have large amounts of data in an excel spreadsheet, inserting a pivot table is a great way to see the data from a macro level. The purpose of a pivot table is to take any amount of data, no matter how large, and summarize it into an at-a-glance
Security Topics Security Update: New Threat Spreads via User's Email Accounts There has been a large increase recently in the number of user's email accounts being compromised. With each account that is accessed by an unauthorized user, this threat continues to spread by reaching out to that user's contacts. This post discusses this recent security threat, what
General Topics The Most Efficient Way to Troubleshoot WordPress Functionality Issues WordPress was originally created as a platform for blogging, but now, is more often than not used to build websites. From its easy-to-use interface, to the thousands of available plugins, WordPress is commonly used by individuals and businesses to create a web presence more closely resembling a website than a
Security Topics Security Alerts: Meta, Mastodon and Windows 8.1 Finally Retiring Tis the season for...increased security risks. Not exactly how the saying goes, but unfortunately, this time of year the threats to data privacy and security can be increasingly dangerous. There are several reasons this happens, for example, we usually purchase more - both online and in-store, we are typically
Organizational Tips How to Quickly Remove 3 Types of Autofill Items that are Incorrect Autofill can be a wonderful feature that saves time and allows us to let go of certain details - like someone's email address or a specific website address, etc. Unfortunately, if you ever misspell one of these, autofill can work against you by pulling up the wrong information
Security Topics Security Alerts: Twitter, Student Loan Forgiveness & Safer Web Browsing With the end of the year holidays quickly approaching, now is a great time to remember how important it is to be hyper-vigilant about the websites you visit, the emails you open, the links you click and the attachments you open. The reason this is especially true at this time
Organizational Tips Why you Have Mock Emails in Mailboxes Using the Mail App on iOS 16 If you have an iPhone and updated the operating system to iOS 16, you probably noticed some changes right away. While some changes are obvious, others are more subtle. Additionally, newer features can be dependent upon the hardware. For example, some features may not be available on older devices as
Organizational Tips How to Log into Websites When Other Accounts are Logged in Without Logging Out While you may wonder why you would want to log into the same website at the same time with different credentials, there are several reasons this could be helpful. For instance, you might want to log into more than one Gmail account without the hassle of logging out of another
Organizational Tips How to Quickly Add a Chart to Visually Compare Data in Excel - Part 2 In the first post showing how to quickly add a chart in Excel [https://eyonic.com/1/?T0], we demonstrated how easy it is to create a chart that visually represents data for easy comparison. This post included creating a bar chart, modifying the data included, changing the labels on
Organizational Tips How to Quickly Add a Chart to Visually Compare Data in Excel - Part 1 In previous posts we have covered some of the many ways Excel can be used to help track data. These have included how to identify patterns like date-based patterns, separating text to columns, creating controlled drop-down menus in cells, filtering data, and much more! Excel is a powerful tool that
Organizational Tips How to Disable Autocorrect When You Don't Want Word Managing You There are times when the autocorrect feature in Microsoft Word is helpful, but there are also times when it feels like it is working against you and it can actually slow down your writing. When writing creatively, autocorrect changing things in the background is distracting and definitely messes with the
Security Topics Uber Breach - Why Even Multi-Factor Cannot Protect Against Every Threat Adding multi-factor authentication (MFA) is an additional security step users can take to help protect their accounts from unauthorized access. MFA can be accomplished in several ways. It may require a code sent in email, text, or provided via an authenticator app. In a recent post we discussed the different
Security Topics 3 Steps to Take to Recover an Email You Think has Been Hacked Thinking an email account has been hacked is very stressful. Email is often our most common communication with others, and someone else gaining access to an email account can have serious repercussions. This situation is made more stressful when you are not sure where to begin to regain control of
Organizational Tips Using Conditional Formatting to Identify Date-Based Patterns in Excel There are lots of ways to use Excel to track data patterns. Using conditional formatting is a way to automate pattern identification and can be especially helpful when working with larger sets of data. In our previous post on conditional formatting [https://eyonic.com/1/?QC], we discussed items like
General Topics The Difference Between Wireless and Bluetooth and When to Use Each Wireless, WiFi, and Bluetooth are all common terms people use, but they do not always understand the nuances between what they do and how they work. Wireless and WiFi are used synonymously and are the same thing: WiFi is short for wireless fidelity, which is often shortened to wireless, both
General Topics Why All your Desktop Icons Suddenly Disappeared on Windows 11 Devices If the device you are using is running Windows 11, you may have recently run into an odd issue where all of your desktop icons were suddenly missing. Many users experienced this after an update to Windows was automatically installed. Unexpectedly losing all of the icons on your desktop can
Security Topics Security Updates: Infected Android Apps, Twitter Vulnerabilities and GPS Trackers Each week there are more data vulnerabilities and attacks released into the wild, exposed by cybersecurity analysts and patched by app developers. The last few weeks have been no exception to this unfortunate reality. This post discusses several recent threats including infected Android apps removed from the Google Play store,