5 security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone

By |2019-11-07T05:43:52+00:00July 14th, 2016|Security|

5 security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone

By |2019-11-07T05:40:18+00:00July 14th, 2016|Security|

Widgets to lockscreens: 6 upgrades in iOS 10

2016 seems to be the year of ‘ten’s for operating systems. The world’s two largest software developers are in the tenth iterations of their platforms, and both are making big splashes in the tech world. Apple presented iOS 10 with all of its new and upgraded features last month, and we’ve seen what the beta

By |2019-11-07T05:40:52+00:00July 13th, 2016|Apple|

Why upgrade to the dual monitor system

Remember in movies, how the villain’s lair is home to an abundance of newfangled tech, gadgets and monitors that stretch as far as the eye could see? Some may attribute it to superb set design but the message behind this was that the road to success (or blowing up your enemies) calls for not one

By |2019-11-07T05:41:23+00:00July 12th, 2016|Hardware|

Can you hear the VoIP man calling?

Back in the day, a phone was just a phone. Now, it’s a veritable computer in the palm of your hand, part tool and part entertainment, with the ability to perform a multitude of interesting and advanced functions. It does still make calls, of course, but even that aspect is a bit different than how

By |2019-11-07T05:43:00+00:00July 8th, 2016|VoIP|

Hybrid clouds give flexibility to SMBs

Most people will tell you that clouds can be only be found in the sky. But in the IT world, clouds are more grounded: the latest of which are a combination of private clouds and public clouds, appropriately dubbed “hybrid clouds.” This innovation allows SMBs to have the best of both cloud worlds while minimizing

By |2019-11-07T05:44:31+00:00July 7th, 2016|Web & Cloud|

4 tips to improve your SMBs Google indexing

On average, Google receives about 40,000 search requests every second. It’s no surprise that people have dedicated their entire careers to mastering how this process takes place and how they can boost sites’ ranking for their own financial gain. Unfortunately, not all businesses have the time or money to utilize one of these mysterious SEO

By |2019-11-07T05:45:08+00:00July 6th, 2016|Google|

WordPress 4.5.3 patches security vulnerabilities

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable platform out there. Recently WordPress has released an update that addresses security

By |2019-11-07T05:46:40+00:00July 5th, 2016|Security|

Bye bye bloatware: Windows gives us Refresh

It started out being called ‘bloatware’ but as consumer’s patience wore thin it was eventually replaced with the title ‘crapware’. In short, it’s the software that manufacturers load onto new hardware before purchases in an attempt to drive customers to new products. And in most cases it’s totally superfluous and burdensome to your system. Since

By |2019-11-07T05:47:58+00:00July 1st, 2016|Windows|

Why Do I Keep Seeing The Same Ads On Multiple Websites?

This is the result of an online advertising approach known as site re-targeting which tracks your online behavior to offer you targeted advertising. At first glance, this may seem like it is posing a security threat, but there are assurances that tracking is done anonymously. Site re-targeting is based on a pretty simple concept. Whenever

By |2022-08-04T08:12:08+00:00July 1st, 2016|Articles|