• Important News: Potential Facebook Data Breach

    Important News: Potential Facebook Data Breach

    Facebook Was Breached Were You Or A Facebook Friend Affected? Facebook has confirmed that more than 50 million user accounts have been breached. They made the announcement today, Friday, September 28th.  However, their engineering team discovered the security breach back on Tuesday, September 25th, 2018. They tell us that the vulnerability has been fixed and the […]
  • Using OneNote on a Tablet: Surface Pro vs the iPad Pro

    Using OneNote on a Tablet: Surface Pro vs the iPad Pro

    OneNote is a free application from Microsoft that allows you to collect notes in a variety of formats – handwritten text, typed text, digital drawings, photographs, links, screenshots, videos, and audio files – and organize them, share them, and use them to create other documents. OneNote is an excellent app whether you take notes in […]
  • Did You Know That October Is National Cybersecurity Awareness Month?

    Did You Know That October Is National Cybersecurity Awareness Month?

    Online security is something that should get everyone’s attention. Threats exist all around us: ransomware, viruses, spyware, social engineering attacks and more. There’s so much you need to know to keep your personal and business information safe.   But… where do you start? As trusted cybersecurity professionals, we want to help you get educated and […]
  • Want To Learn 3 Cool Linkedin Tips?

    Want To Learn 3 Cool Linkedin Tips?

    Profile – Viewing – Searching We get questions from our clients about using LinkedIn all the time. And we get so many that we’ve been keeping track of some of the most commonly asked ones. We’ve posted three of them here with detailed answers for you. 1. “Is There A Way To Change How My […]
  • What Are 4 Trends to Watch to Succeed in the Legal Field?

    What Are 4 Trends to Watch to Succeed in the Legal Field?

    Discipline, honor, tradition, and excellence—these could previously be described as the foundation of the legal profession. After decades of consistency, however, the field of law is experiencing an extensive transformation with far-reaching effects. For better or worse, much of this has been attributed to the millennial generation: those individuals born between the early 1980s and […]
  • 10 Critical Things To Look For When Choosing An IT Service Provider

    10 Critical Things To Look For When Choosing An IT Service Provider

    How Do We Choose An IT Service Provider? 10 Critical Things To Look For If your IT company doesn’t return your phone calls, their prices are too high, or they run in to “fix” things only to run out before you find what was done, you need to choose another IT Service Provider. But what […]
  • Can Business Benefit From Microsoft Office 365?

    Can Business Benefit From Microsoft Office 365?

    In today’s business world, it’s important for companies to stay ahead of the trends when it comes to the latest in tools for productivity. Office suites like Microsoft’s Office 365 have become popular among organizations hoping for more effective performance and communication. With Office 365’s subscription plans, users gain access to the full list of […]
  • The Intelligent New (and Awesome) Data Types Supported by Microsoft Excel

    The Intelligent New (and Awesome) Data Types Supported by Microsoft Excel

    To date, Excel and similar apps deal primarily with text and numbers as data types. However, that tradition is about to be a thing of the past as Microsoft is adding two new data types to Excel. These data types allow cells to contain rich, intelligent data that can better represent more real-world data types. […]
  • What Do I Need To Know About The Google Chrome Vulnerability CVE-2018-6177?

    What Do I Need To Know About The Google Chrome Vulnerability CVE-2018-6177?

    What is CVE-2018-6177? Today’s new releases of browser software are supposed to be improvements over past versions in terms of functionality, helpful features, security, and the speed of overall operation. However, these changes often involve new vulnerabilities which hackers can target and exploit. A recent release of Google Chrome is a good example. A vulnerability […]
  • Check Spelling With Microsoft PowerPoint 2016

    Check Spelling With Microsoft PowerPoint 2016

    If you’ve ever attended a high-level education course or business meeting, chances are you’ve come across the PowerPoint presentation. Microsoft’s PowerPoint program has been helping students and professionals organize their thoughts and ideas for decades. From class presentations to complex business proposals, Microsoft PowerPoint 2016 holds a wide range of benefits for users. Familiarizing yourself […]
  • Master Google Search In Just 28 Minutes

    Master Google Search In Just 28 Minutes

    This month’s training on demand focuses on helping you find the most accurate information you need on Google. We’ll leave no stone unturned in this 28-minute online training session. Learn how to find answers to your queries and questions right through to advanced techniques using Google. Click the video play button below to get started. […]
  • How Can WPA3 Protect Me From Hacking?

    How Can WPA3 Protect Me From Hacking?

    What’s WPA3? WPA3 is an improvement to WPA2 security, which is still commonly used after having made substantial improvements over WPA. It is expected to better protect users from software hacking. In partial development for approximately 10 years, this improved form of security allows users to experience the benefits of additional features. These features include […]