General Topics How to Troubleshoot the Cause of a Computer Crash For weeks we have been focusing on topics to help people who suddenly found themselves working from home. This week we continue this theme and include some troubleshooting steps you can take if your computer crashes. With increased use, running into an issue is more likely. Luckily, even if your
Security Topics What You Need to Know about Zoom's New Features Zoom has quickly become an important tool in our new work-from-home lives. Unfortunately, there have been bumps along the way, including security and privacy controls. As the video conferencing application became widely used, one of the biggest issues users have experienced is having unwanted guests join meetings for the purposes
Security Topics Security Update & How to Protect Remote Workers Whenever there are major headlines in the news, hackers use them to attack innocent people in hopes of breaking their security. Unfortunately, the current pandemic is no exception to this phenomenon. Also, with the rise in remote workers, there are things you need to consider to protect yourself. This post
Organizational Tips How to Make Sense of Spreadsheets - Filters & Sorting I'll be honest, I love spreadsheets. I find their functionality useful for tracking and managing several things for my business and personal life. If you have not found ways that spreadsheets can be useful, or are perhaps overwhelmed by the software's possibilities, read on for real
Organizational Tips 3 Free Tools to Help you Work From Home Working from home, or working remotely, has moved from a benefit of a job, to a necessity to keep our businesses moving forward as a result of the spread and threat of the COVID-19 virus. Some businesses were fortunate by already having remote workers which meant they already had the
Organizational Tips 5 Things to do to Increase Technology Resiliency Technology is an important tool people use throughout their day. Smartphones connect us to email, friends and family, and people all over the world. Computers connect us to our jobs and businesses. Lastly, networking equipment connects us to the Internet and therefore the world. When one of these areas fails,
Security Topics Security Update: Misspellings, the Latest Phishing Attack Attacks against the security of our devices, and our data, are constantly evolving. The offenders of these attacks implement their schemes, track the success of them, tweak the attacks to be more successful and begin the cycle all over again. This is one reason why attacks are consistently changing. Other
General Topics How to Recover a Program Window Falling Outside your Screen One of the most convenient features in Windows is the memory state of program windows though it is likely something you never consider. This feature is one that remembers the size and location of program windows so that every time you open a specific program, its window opens in the
Security Topics 3 Ways to Protect Yourself from Scandalous Stories When something shocking happens in the world, it is normal to wonder about the details. An earthquake with fatalities, a celebrity death, or the spread of a potentially deadly virus are examples of stories most people are at least mildly curious about. We hear about these stories via the news,
Security Topics How to Upload Tax Documents to a Secure Server Once the new year begins tax season is nearly upon us. New forms are due to our employers, employers owe employees tax documents, and a myriad of other documents are due to people from mortgage loans and investments. The end of January is the deadline for most tax documents. Anyone
Security Topics How to Add Security so Files Aren't Modified / Opened by the Wrong User Last week's post discussed how to fix an error with Adobe Reader and included reasons why sending a file in .pdf format is helpful. Some reasons were to maintain the original formatting and keep users from making changes. This week, we are expanding upon the idea of managing
General Topics How to Stop Adobe Content Creation Popup When Files Open As long as companies make software, they will make changes to their applications. Some changes are driven by security vulnerabilities, others are feature changes and improvements driven by customer feedback. Unfortunately, sometimes an update is implemented that drastically changes the way the software behaves, which can be frustrating to users.
Organizational Tips How to Control Windows 10 Popup Notifications Some popup notifications are helpful. They save time, consolidate different types of information into a single location and draw your attention to important items that need feedback. However, they can also be a huge distraction by interrupting what you are currently doing. Though Windows 10 notifications can feel like popups
Security Topics Security Round Up: Windows Vulnerabilities, Ransomware and More We are only a few weeks into the new year and already there are new security attacks and repeat offenders in the news. Patch Tuesday was a really big deal for Microsoft this month and you will want to reboot your computer sooner rather than later to apply those changes.
General Topics How G Suite Security Changes Will Affect Access It does not take the start of a new year to bring changes in tech. Technology is often changing faster than most people are ready for, yet it is often what people love about technology. There are going to be some major changes coming to Google's G Suite
General Topics 4 Things to Know Before Signing a Copier Contract When a business purchases a copier, it is often a big expense, especially for smaller businesses. Large copiers are a good investment for many types of businesses, though they are costly. The cost per printed page is much cheaper than using individual printers, there are less machines to maintain, and
Security Topics Security Round Up: Exposed Birth Certificates, Smart Locks & More Holiday time, it's the most...potentially dangerous...time of all. From a security stand point, the holiday season introduces a great deal of risk. This time of year is fraught with threats at every turn. These may include credit card theft, insecure websites, phishing emails, data breaches, and
General Topics How to Preview Hyperlinks in the New Apple iOS With each new operating system version, whether on a smartphone or computer, changes are introduced. These changes affect the way you accomplish tasks, what features are available, and oftentimes the organization of settings. Some changes introduce new features, some make things more efficient, while others make something that used to
Security Topics Technology Round Up: Office 365 Outage, Apple Settlement & More Keeping up with all the news about technology would be a full time job. From new applications to Ransomware attacks to security breaches, there are an unlimited number of sub-categories within technology to focus on. Even if you were diligently tracking technology news, there could be some recent items you
General Topics When you Should Subscribe to O365 Versus Purchasing Office The Microsoft Office suite has been around for many years and gone through many iterations. Some changes were more dramatic than others, looking at you ribbon bar, but none more so than when Office 365, (or O365), was released. While the software applications included with O365 look and act similar
Organizational Tips Why you Receive Emails from Blocked Senders in Outlook SPAM emails are practically inevitable. Once an email account is used to place an online order, is listed on a website, signed up for a newsletter or if it is one that you have had for a long period of time, you can expect SPAM. There are ways to reduce
General Topics How to Fix a Windows Update that Blocks File Sharing Windows updates commonly address security issues as well as add features and functionality. Unfortunately, they can introduce issues that we as users do not expect. In some cases, these issues are unavoidable because updates on a Windows 10 device are more aggressive than they were in previous operating systems. Most
General Topics Remove this App from HP Devices to Prevent Blue Screens When you purchase a new computer or laptop it inevitably comes preloaded with many different software applications. Some of the software comes from the device manufacturer, others are from third-party vendors typically by way of short-term trials. Other applications run in the background and we never interact with them directly
Organizational Tips How to Copy Files When you Create a New User Switching devices can be tedious and one of the most challenging parts is getting your user profile, or user account, on the new device to mimic the look and feel of your old device. The longer you use a device, the more customizations and files you have associated with that
Security Topics Cybersecurity Awareness Month & Security Round Up In case you have not heard, October is Cybersecurity Awareness Month. Cybersecurity is an important topic in technology and a part of our everyday lives even if we do not realize it. In general, cybersecurity includes the protection of devices and data from unauthorized access. Attacks may target devices, accounts