The massive data breach at Facebook has been a hot topic in the news lately, and you may be wondering if your data was affected and if your personal information is secure online. The data breach, which happened when the political research firm Cambridge Analytica obtained the data of 87 million users, affected people around the globe. If your privacy and security is important to you, read on to learn more about how you can tell if your data was compromised, and what you can do to prevent future risks. Continue Reading
If you have trouble with Google’s Chrome browser crashing when you are using it, you are not alone. Windows users have been complaining of this issue for a while and Google’s tech team has decided how to handle the problem. In most cases, Windows users have other programs running while running Chrome, such as antivirus and accessibility software. Unfortunately, these programs inject code into your Chrome web browser, causing it to crash. Google states that Windows Chrome users have 15 percent more crashes than other users. Continue Reading
We’ve all been to the pediatrician’s office and heard the question, “How many hours of screen time does your child get?” We’ve heard the research, so some of us may lie and subtract an hour (or two) from the real answer. As parents, we’ve been told that too much screen time is bad for our children. Experts say it can lead to diminished personal relationships, obesity, and can even affect your child’s brain. So we feel guilty if we turn on the television to get a few extra minutes to finish cooking dinner or hand our screaming three year old the phone so he will stop crying. But is there really a basis for the claims that screen time harms our children? Continue Reading
There are a lot of different kinds of malware out there and most of it is relatively harmless. There are the adware types that cause a bunch of unwanted advertisements to pop up on your screen infection occurs, botnets that use some of your resources to send spam emails or contribute to DDOS-ing a targeted website, and the ‘fake tech support’ that, hilariously enough, informs you that your computer has been infected with malware. However, it’s been a long time since malware was a laughing matter. Over time, hackers realized they could make money by stealing credit card numbers banking login information and it occurred to some bright cyber-criminal that they could simply and openly extort their victims. Thus the birth of ransomware. Continue Reading
Apple released iOS 11, its newest version of the mobile operating system powering iPhones and iPads last month. And as is the case every time such a major update happens, countless Apple device users users are facing a decision on whether or not to download it, not knowing what to expect.
The newest iteration has some potentially major changes in stock, depending on how you use your mobile device. So whether you’re already completed the update or are still considering it, here are 10 features that are new to iOS 11 for your consideration. Continue Reading
When a company decides to outsource their IT services, there are always a few decisions to make. Whether or not to hire someone local or a larger fully-remote service, how much service your company needs, and how much interaction you’d like with your external IT team. Some companies with very few computers or need for innovation may find that basic emergency break-fix services are sufficient but in the modern age when most companies have a website, app, and software suite, it’s best to go for complete managed IT. How is this different from a break-fix package? Managed IT services take pride in their ability to provide technical support above and beyond the basics, working with companies rather than simply working for them when something goes wrong. Here are the five primary reasons why a high quality managed IT service offers much more than break-fix solutions. Continue Reading
Going back to school makes us think of new backpacks and freshly sharpened pencils, but children today might have another item on their shopping list: a new mobile device.
Even if they make do with the old one, you know they’re still putting it to use: as of 2015, teenagers were spending about nine hours a day using digital technology, while kids ages eight to 12 were spending about six hours. Those hours are spent watching videos, listening to music, and engaging with peers via apps like Snapchat and Instagram.
All that time online exposes children to a variety of risks. We’ve been talking about online predators for years, but there are some other concerns you may not have considered. Continue Reading
It is difficult to overstate the importance of having a rock-solid backup and recovery plan for your company’s data. Although nearly every business has some form of backup plan in place, many fail to take all the necessary steps to ensure that their plan will deliver when they need it most. Here are five simple principles you can follow to improve your company’s backup and recovery plan: Continue Reading
Apple’s Worldwide Developer’s Conference (WWDC17) didn’t disappoint this year. Announcements ranged from the Apple HomePod to iOS 11 to “the world’s most powerful Mac.” Here we have a look at the full spectrum of new Apple products, software and services announced. Continue Reading
iOS 10.3 is an important new release, with new features from Siri to the file system. As with almost every release, it includes lots of security fixes, so just staying safe is enough of a reason to upgrade. The latest version is actually 10.3.2, which fixes some bugs and security issues. The release notes are available from Apple.
Version 10.3 requires an iPhone 5, fourth-generation iPad, sixth-generation iPod Touch, or later. Continue Reading