Blog

Social engineering and personal security

Social engineering and personal security

The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information.

Exciting new VoIP features for businesses

Exciting new VoIP features for businesses

VoIP acts as a bridge between traditional landlines and our internet-centric lives. By unifying communications under a single system for voice, data, and video converged networks, many businesses are realizing unprecedented savings and improvements to their workflow models.

Big data gives a big help to hospitals

Big data gives a big help to hospitals

Costs are a major concern when it comes to IT solutions, and the healthcare industry has its struggles trying to keep up with the latest technology on the market. Thankfully, cloud solutions and increased storage availability mean hospitals and clinics finally get some relief.

Grow your business with virtual reality

Grow your business with virtual reality

Besides looking like an early version of Cyclops from The X-Men, what’s with all the hype on virtual reality? How much of a difference can be made by slipping ourselves into a three-dimensional world? For businesses, operating with the same routine day in and day out can be quite monotonous for employees.

New collaboration features for Office 365

New collaboration features for Office 365

If you thought Office 365 couldn’t get any better, Microsoft was not of the same mind. Late last month the company announced a new feature that allows users to invite guests to interact with 365 groups and their content. Whether they’re international business partners, local customers, or infrequent clients, you can involve them regardless of their 365 subscription.

iPad price drops with more storage

iPad price drops with more storage

With its most recent keynote, Apple has increased the storage capacity of iPhones and iPads. Minimum storage for these two devices have risen from the 16GB to 32GB, with iPad prices remaining the same. If you are thinking about buying a new iPad, stay tuned for the latest info about storage upgrades and the reduced price per gigabyte.

Huawei tapped by Google for its next tablet

Huawei tapped by Google for its next tablet

In a bombshell announcement for the non-Apple gadget geeks, reports are surfacing that Google plans to team up with Huawei to build its next Nexus Android tablet. Up until last year, Huawei’s relationship with Google has been limited to manufacturing the Google Nexus 6P phone.

Virtual networks: the future of security

Virtual networks: the future of security

For the average business owner, a virtualized network may not seem groundbreaking. And until recently, even the team at VMware didn’t realize just what they could do with it. Now that they’ve publicly announced what they’re calling “Project Goldilocks,” we finally see how relevant it is.

Windows 10: tailoring your notifications

Windows 10: tailoring your notifications

Regardless of the app, platform, or operating system, digital notifications are a tricky business. Our devices are overcrowded with software of varying importance, and without proper customization the stream of information can become overwhelming. Thankfully, Windows 10’s action center is built atop a solid foundation — it just needs a bit of help.

IT jargon: a glossary of cybersecurity terms

IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.