3 great upgrades to Chrome this month

3 great upgrades to Chrome this month

Unlike the release schedule of the Android operating system, new versions of the Chrome browser come out so often that they’re distinguished only by the version number. The most recent release is number 57, and it packs a little more wallop than the average upgrade. If you’re a Chrome user, there are three improvements you […]

Breaking down Nougat 7.0’s major upgrades

Breaking down Nougat 7.0’s major upgrades

It’s official. Google Pixel users have lost one of their best bragging rights. The latest addition to the family is considered to be one of the most advanced devices on the market. But Android 7.0, one of the most recognized software features, will soon be available to users with older smartphones. Let’s take a sneak […]

Azure and XenDesktop cozy up to each other

Microsoft has been working closely with software vendors to make it easier for businesses of all sizes to have access to virtualization services. The latest development in this effort has resulted in cheaper, simpler, and more modern solutions to the complexities of remote desktop administration. For those who don’t know, Azure is Microsoft’s build-it-yourself cloud […]

The wait for Microsoft Teams is over!

The wait for Microsoft Teams is over!

Slack is a well-known, cloud-based collaboration tool that helps your team communicate better and be more productive. Microsoft Teams is Window’s own version with a twist. It’s been reported that prior to its release, a gigantic update was rolled out that equipped Teams with a bevy of features that will definitely make a difference. Smarter […]

5 steps to eliminate ads in File Explorer

5 steps to eliminate ads in File Explorer

Microsoft has quietly begun doing the unthinkable: inserting advertisements into your File Explorer. The last place anyone ever expected to see a OneDrive promotion is right alongside their ‘My Documents’ folder, and we expect the first thing they’ll think is, “How do I turn that off?” Read on to find out how. Who is getting […]

Check the list of free ransomware decryptors

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands. The state of […]

Defend yourself from this new Mac ransomware

Defend yourself from this new Mac ransomware

Cybersecurity experts stumbled into a ransomware variant late last month, but this one doesn’t target Windows devices. The malware, known as OSX/Filecoder.E, encrypts Mac data like any cryptolocker strain many businesses have seen in the past. However, unlike normal ransomware that release files after the Bitcoin ransom is paid, this new strain makes no such […]

Order management systems and eCommerce

Order management systems and eCommerce

If business value is all about the long-term health and well-being of your company, there are few things more important than getting your product into customers’ hands swiftly and efficiently. Thankfully, modern technology has revolutionized these tasks and how you add value to your business. Let’s take a look at one of the most recent […]

Beware of the Cloudbleed bug

Beware of the Cloudbleed bug

Cloudflare, an internet security services company, found a major bug in its software that leaked sensitive data like cookies and passwords from client websites. Although investigation into the security flaw, also known as Cloudbleed, is still underway, early reports found that malicious hackers have not exploited this vulnerability. Even still, you should know what you’re […]

Is your Android smartphone a security risk?

Is your Android smartphone a security risk?

Desktop and laptop users install security software updates and do everything they can to safeguard against cyber attacks. The same cannot be said of smartphone users. This is understandable because cyber threats on mobile phones are less visible… but that doesn’t mean they don’t happen. When you factor in smartphone users’ growing dependency on mobile […]