Recycling Your Technology

Recycling Your Technology

By now we should all know that you cannot just throw old computers and electronics in the garbage. The materials inside the devices that keep our lives running smoothly are not always benign in nature, they often contain heavy metals like mercury and other substances...
Building A Phish-Resistant Office

Building A Phish-Resistant Office

Hackers know that the easiest attack vector for compromising networks is the people who interact with them. Phishing is a favorite method of hackers who use social engineering to turn your employees into security exploits. It’s often as simple as sending an emailed...
Social Media And Vulnerability

Social Media And Vulnerability

It sometimes seems like everything we do is documented online. All over the world, people are sharing their likes and dislikes, their dietary choices and their travel plans with friends and total strangers alike. To what extent is the information we are sharing...
Microsoft 365 Vs. Office 2021

Microsoft 365 Vs. Office 2021

Last October, Microsoft released their latest “standalone” version of the Office app suite, Office 2021. But what is the difference between this standalone version of Office and the cloud-connected Microsoft 365?   Software As a Service The thing to remember...