Blog

Simplify calendar sharing with Office 365

Simplify calendar sharing with Office 365

Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers.

5 great voice commands for Google Now

5 great voice commands for Google Now

Google Now has been around for years, but the service still doesn’t have the name recognition of Apple’s Siri or Amazon’s Alexa. Considering that it is delivered on nearly every new Android device, it’s a crime that it doesn’t get more use.

How to protect against VoIP call hacking

January 17th, 2017 VoIP
How to protect against VoIP call hacking

VoIP has become the ultimate communication tool for enterprises, but it has also become another vulnerability that hackers exploit. Because voice is essentially transferred as data, the risk of digitized messages being intercepted and heard by unauthorized ears increases.

Type and talk on enhanced Google Assistant

Type and talk on enhanced Google Assistant

By now, that voice on your smartphone that you constantly rely on to search for recipes or movie schedules may already be part of your Googling routine. As helpful as it is, barking commands at your Google Assistant, an intelligent personal assistant, isn’t always the best way to go.

Security Tips Now That You Own an Amazon Echo or Google Home

So you've received an Amazon Echo or a Google Home over the holidays. You know that your new device will help to simplify your life, but how secure is each? How do you protect your privacy, while still enjoying the benefits each provide?

Here are some general tips you can take to protect your privacy and feel more secure:

If there’s conversation that you don’t want picked up, physically mute your device.

Window 10’s biggest flaws addressed

Window 10’s biggest flaws addressed

In the past year, Microsoft was heavily criticized for forcing the Windows 10 OS update on PC users. After thousands of customer complaints, the tech giant vowed to make changes and appease disgruntled end users. With the new year are signs that the firm is finally tending to these problems.

Cyber security and managed services

Cyber security and managed services

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact.

Why consider disaster recovery for 2017

Why consider disaster recovery for 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old yet essential IT resolution: disaster recovery.

Facebook’s group voice calling

Facebook’s group voice calling

“What’s your Facebook name?” is not a question you’re often asked when someone needs your contact details. In the first place, Facebook messaging isn’t everyone’s voice call app of choice, especially for group conversations. As of now, Skype rules that arena, especially for business communications.

Flaw allows thieves to open locked iPads

January 9th, 2017 Apple
Flaw allows thieves to open locked iPads

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices.