4 February, 2021 LibreOffice: An Open Source Alternative to Microsoft Office The phrase “open source”, as used in the title, can also be read as “free.” That is correct – the…
22 January, 2021 Teleworking: Information Security Essentials for Organizational Leadership Teleworking: Information Security Essentials for Organizational Leadership The COVID-19 pandemic…
13 January, 2021 Free, Reliable Tools to Help You Protect Yourself From Identity Thieves There are many reputable free tools available online that will allow you to lower your chances of…
6 November, 2020 7 Common Myths About Hypertext Transfer Protocol Secure (HTTPS) You Shouldn’t Believe Hypertext Transfer Protocol Secure (HTTPS) has surpassed Hypertext Transfer Protocol (HTTP) to be…
14 October, 2020 10 Tips for Developing a Disaster Recovery Plan (DRP) Most businesses rely on information technology (IT) systems. Even a small business may have criti…
1 October, 2020 5 Ways an IT Provider can Save Your Business Money Outsourcing your IT department offers impressive benefits, such as improving productivity, increa…
17 June, 2020 The Psychology of Data Theft: Tricks Social Engineers Use and How to Fight Back Identity theft has reached epidemic proportions, with millions of stolen credit card numbers, Soc…
1 June, 2020 Two-Factor Authentication: What You Need to Know You may have noticed lately that more businesses have made signing in to your online account more…
21 May, 2020 10 Easy Ways to Improve Your Zoom Experience Amid the self-isolation and quarantining of the COVID-19 pandemic, Zoom has matured into the most…