Not too long ago, the thought of being able to access printers from your computer, tablets or smartphones was almost unheard of. But today, it’s a completely different story — enter Google’s Cloud service. Now you can access both regular and Internet-enabled printers through the web. Read on for more information. First things first, the […]
The latest Cloud Print service from Google
Shiny gadget of the month: Dot: The Physical Push Notification
It is now 2017 and smart devices and technology just keep coming out, each more exciting than the last. It seems like there is always a new device coming out to help us make our dumb homes, smart. I personally think it is exciting and have been slowly accumulating smart home devices over the past year, some of which have been written about in our newsletter (WeMo switch, Amazon Echo, etc). The Dot is yet another extension for home and workplace automation.
Cybersecurity threats to look out for in 2017
2016 is now a thing of the past. Last year we saw new cyber threats emerge and existing ones on the rise. Unfortunately 2016 does not appear to be a fluke and now 2017 is primed to face even more threats. Luckily that does not mean that all is lost, we can use the trends and knowledge from last year to help predict threats and be prepared for the coming year to protect ourselves and our businesses from hackers.
2017 IT essentials: disaster recovery plan
When disaster strikes, organizations need to put their business continuity plans into action and recover their IT systems as quickly as possible. Failing to do so can mean serious financial and reputational repercussions. Despite this, investments in disaster recovery are set aside each year for high-tech IT investments, and every year companies and employees continue to suffer for it.
New virus threatens virtual machines
Before some of our clients have even had a chance to wrap their heads around what virtualization is and how it works, hackers have already started attacking the new and exciting technology. By updating a virus from several years ago for virtualized environments, hackers hope to totally wipe the data off your hard drives. If […]
Let Office 365 help you save the date
When you’re planning a reunion, going back and forth with your friends is frustrating, to say the least. Imagine a similar scenario in your office. The benefits of sharing your calendar with colleagues include knowing when to hold meetings, set project deadlines as well as knowing the best time to talk with clients. Knowing this, […]
Windows 10: user complaints addressed
Over the past year, Microsoft received major backlash for ‘forcing’ the Windows 10 update as well as future updates on PC users. Fortunately, the tech leader is taking steps to address customer complaints. This article takes a look at what changes we can expect from Microsoft this coming year. A patch and a glitch away […]
Statistics for cyber security during 2016
As cyber attacks continue to rise, businesses large and small need to stay one step ahead with IT services that keep them protected no matter what. What once were minor nuisances have now become advanced threats that can actually put you out of business. In fact, these cyber attack statistics will prove to you that […]
Group voice call on Facebook
Skype used to dominate an area of VoIP communications that serves a special function: group video calling. With apps like Snapchat, WhatsApp and, most recently, Slack nipping at its heels, it comes as no surprise that social network behemoth Facebook takes a slice of the cake with its recently rolled out desktop group voice calling. […]
iPads allow thieves to bypass lock feature
Nobody wants to spend the day stressing about dangerous scenarios and “what-ifs,” but in some cases we really must insist. In a recent development, it was discovered that one of the iPad’s anti-theft measures can be easily bypassed with little to no special training. And although no one wants to assume his or her tablet […]