Blog

4 different types of hackers

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

Picking a mouse that you click with

Picking a mouse that you click with

When you’re tired of using an uncomfortable mouse or struggling with your laptop’s trackpad, it’s time to buy a new one. But with so many brands and models out there, where would you even start looking? Finding the right mouse to fit your hand comes down to two things: ergonomics and features.

How to get 500+ connections on LinkedIn

How to get 500+ connections on LinkedIn

500+ LinkedIn connections can seem like a lofty goal. You have a business to run, and probably don’t have much time to dedicate to the platform. However, carving out the time to grow your LinkedIn network can prove invaluable as it will provide social proof to yourself or organization and presents the opportunity to connect with new clients.

New Office 365 feature for more secure email

New Office 365 feature for more secure email

Most of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this.

5 design ideas to revamp your website

5 design ideas to revamp your website

These days, it’s almost impossible to see a business that does not have a website. Even small businesses have taken to the Internet to find more customers and create an online presence. The problem is, with so many companies creating their own websites, yours can get lost in the shuffle.

How to make the most out of your BYOD policy

How to make the most out of your BYOD policy

There’s a lot of talk about BYOD policies these days. While most companies are more concerned with the security risks that go along with bringing your own device, far fewer business owners forget the productivity risks. Believe it or not, a poor BYOD policy (or lack thereof) can actually hurt your staff’s productivity.

4 Security risks to consider with BYOD

4 Security risks to consider with BYOD

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly.

What are Office 365 Connectors?

What are Office 365 Connectors?

Recently, Microsoft announced a new feature in Office 365 Groups called Connectors. As part of their new openness mantra, Office 365 Connectors allows you to connect with popular third party services without ever having to leave your Outlook client. This means relevant content and updates that you want are sent immediately to your group feed, making workflow more seamless.

BSoD: what is it and how do I fix it?

BSoD: what is it and how do I fix it?

If you’ve had some experience with a Windows PC, you are likely familiar with the unwanted Blue Screen of Death, also known as BSoD. This is a critical failure error that occurs when hardware or software is not working properly. The worst thing about it is that you could potentially lose the files you were working on in the process.

Get the most out of Facebook reactions

Get the most out of Facebook reactions

Love, Haha, Wow, Sad or Angry. If you’ve been on Facebook recently, you’ve probably noticed that Facebook has finally added five more ways for you to react to a particular post. Many businesses will find this feature important since these new emoticons now provide a way for you to know what users feel about your service instantly.