BLOG
More than ten years ago, the most common forms of malware attacks were those that were initiated by way of macros. Macros, in case you are unaware of what they are, are little bits of VB code that are...
Smart devices are wonderful. The latest smart phones all have virtual assistants you can just ask questions rather than bothering with the whole typing thing. That’s both fantastic and convenient. The...
Who doesn’t love Radio Shack? The company is as much a part of American retailing lore as Sears and Roebuck and Macy’s. The TRS-80 the company made famous was instrumental in the popularization of the...
When looking at cloud computing options for your business, you should examine the benefits and the drawbacks of both public and private cloud services. A public cloud gives you the flexibility to work...
In the wake of the now-infamous Sony hack, many new security vulnerabilities are being found across a wide range of devices. Check Point Software Technologies recently revealed a flaw found in...
Today, companies are able to collect massive amounts of data about their customers and their shopping habits. This data can provide companies with valuable insights into what products they could sell...
Social media has become much more than just a place for individuals to hang out and share their latest stories and pictures. Today, businesses are more involved than ever, and many companies have...
With the advancement of technology comes a host of new problems that IT leaders must tackle. In the past, IT leaders have had to wrestle with a variety of issues, from what types of computers to buy...
Email is a valuable tool to any business. It is used by everyone and has become the top communication method used by people worldwide. However, from time to time it has also become a great source of...