Mac time-saving checklist for 2018

Mac time-saving checklist for 2018

In the IT industry, continuous improvement is the name of the game. Whatever makes a business work faster, smarter, and more effectively is a welcome competitive advantage. If you’re a Mac user, do you think you’re taking advantage of all of the best time-saving tips out there? Here’s a checklist you can use to find […]

Chrome to mark HTTP as ‘not secure’

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward […]

5 new features for Outlook

5 new features for Outlook

Lately, Microsoft has given some love to Outlook — not just the desktop app, but also the web and app versions. In fact, they just released a bunch of new and improved features. Let’s take a look. #1 RSVP Outlook makes it fairly simple to invite people to a meeting, but now it will also […]

OneNote excluded from Office 2019

OneNote excluded from Office 2019

Microsoft is pushing its users to use the UWP (Universal Windows Platform) app of OneNote which will be included in Microsoft Office 2019 and Office 365. This means the OneNote desktop app will no longer be packed with future versions of Office. Microsoft’s OneNote desktop application is nearing the end of its journey, as the […]

Office 365: New security updates

Office 365: New security updates

Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection. Files Restore in OneDrive Previously available only to Office 365 business users, Files Restore allows users […]

Tech support scam alarms Chrome users

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instructions listed on the screen will lead to an actual security breach. The End Game The scam works […]

Meltdown and Spectre fixes cause problems

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk. Unsecured […]

Outlook on Mac and Windows gets redesigned

Outlook on Mac and Windows gets redesigned

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes. How Outlook […]

How to defend against WannaCry

How to defend against WannaCry

Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions earlier this month. Like most ransomware, WannaCry encrypts files and demands a Bitcoin payment for their release. What’s worse, more WannaCry variants will likely be developed in the near future, according to […]

Is the government really spying on you?

Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and…TVs? Let’s see just how worrisome they really are. What devices and apps are supposedly vulnerable? Wikileaks […]