It seems that almost everything we do today requires a password. Banking, email, social media, shopping, every service requires a unique account with its own set of credentials. So how do we keep track of this massive and ever changing list of passwords, while still...
With the variety of malware, phishing schemes and other malicious attacks in the news, most people have become sensitive to the fact that they should take steps to secure their accounts whenever possible. This can mean different things to different people; cycling...
There are so many devices available on the market these days, from handheld tablets to powerful desktop machines. Over the past several years, Chromebooks have become a popular hybrid solution for users who are seeking something more than a tablet but less than a full...
It has become much more common over the years for businesses to allow, or even rely on employees bringing their own personal devices for use in an office environment. This may mean using a smart phone as a verification device, connecting to a shared drive with a...
As we roll into autumn, businesses will be looking toward the end of the fiscal year and savvy office managers should incorporate technology planning into their end of year calculations. There are many aspects of this planning that include simple maintenance,...