Blog

The 101 on Android location settings

As you learn about the various features of your Android smartphone, you will come across location services and whether or not you want to approve them. If you think this convenient feature is harmless, think again. Sometimes it’s best to hide your location in your smartphone as this can affect your device’s security.

What makes hypervisors weak?

Hypervisors have changed the game of cybersecurity. They provide unmatched cyber protection for your data as they keep it in the cloud. However, hypervisors still have vulnerabilities that hackers can exploit. Find out how their weak points can be addressed.

How to set up your G Suite dashboard

G Suite is Google’s all-in-one computing, productivity, and collaboration tool. It comprises of Gmail, Hangouts, Calendar, Google+, Docs, Sheets, and more, allowing for better collaboration, data sharing, and work efficiency. Here’s how to configure it.

Assessing your MSP in the first appointment

Assessing your MSP in the first appointmentHanding over your IT to a MSP is a major decision. Who do you choose and more importantly, how? While there’s no rulebook that will tell you exactly how to proceed, here are a few hints that can help you decide how invested your prospective MSP is into you.

VoIP hardphones or softphones for SMBs?

Your company has decided to avail of Voice over Internet Protocol (VoIP) and has given you the task of choosing between the two types of phones: traditional desk phones (hardphones) or software-based phones (softphones). To help you decide, we’ll break down the benefits of each type.

Make the most out of your O365 subscription

It may seem as if Office 365 is merely Microsoft’s way of joining the online subscription bandwagon, but that's not the case. O365 is Microsoft’s way of upgrading its ubiquitous Office suite by augmenting it with cloud features.

Office apps and the files you create with them are accessible wherever there’s an internet connection, but that is actually the bare minimum that O365 offers.

How Windows 10 features keep ransomware at bay

The ransomware threat isn’t going away anytime soon, which is bad news for computer users everywhere. Fortunately, Windows 10 has built-in security features to keep you from falling victim to ransomware.
Controlled Folder Access
This feature allows you to list certain documents and folders as “protected.

Tips to monitor employee activities online

There are a lot of pros and cons when it comes to monitoring your employees online. We’ve put together an honest and transparent list of arguments for and against this practice. And if you decide it is something you want to pursue, we’ve provided some tips for a smooth implementation process.