News
Android security basics for all device owners
The most popular mobile operating system in the world is Android, with more than 2 billion monthly active devices.
After Hours Service is Here!
While we have always prided ourselves on having an excellent response time for any call during the business week we have never provided any official after hours service to our treasured clients.
The Power of Two
A one-time password(OTP) is a password that is valid for only one login session. OTPs avoid a number of shortcomings that are associated with traditional (static) password based authentication.
Tablet VS. Laptop
Many people wonder if a laptop or a tablet will serve their needs. After all, tablets are easy to use, very portable, and internet-capable just like a laptop.
Create an email signature onto your iPhone
Today’s email signatures contain a lot more than just your name and contact details. Many of you have this on your main computer email system but when it comes to your mobile devices “sent from my IPhone” is as flash as it gets…
Viruses are getting smarter
Within the last year we have been seeing an increasing trend in viruses called Ransomware.
Tracking a Lost or Stolen Mobile Device
As always it is best not to lose it in the first place, but being prepared for the possibility is second best. By default most mobile devices can be found.
Google Analytics
Google analytics is a service offered by Google to measure and report on visitors to your website. The service can generate detailed statistics and reports to let you make informed decisions about what does and doesn’t on your website.
How to Make a Strong Password
Just following the “8 4 Rule” will ensure your passwords are much stronger than before for those of you who don’t follow any guidelines or rules when creating a passwords.
Developing an IT Strategy
Developing an IT strategy allows for appropriate planning to occur, which helps removes quick decisions when systems fail and you need a replacement PC immediately.
Email size does matter
Email size when sending and receiving may have a limit. Obviously, if you send an email that exceeds the maximum email size limit of the recipient’s email provider, your email will bounce.
Benefits from using dual monitors
Extending your computer to a second screen is actually easy, although to some people it sounds like it would be more difficult or involved than it really is.
Facebook Security Settings
If you’re like the most of us here, you like to share your social life with a select group of friends and not the rest of the world, there are a few settings you should make sure are in place going forward
Using Secure Passwords
Users should be aware that a password is no different than the combination to a safe and should be protected in the same way.
Selecting A Web Designer/Developer
Before starting it’s important to determine the purpose of your site. Do you want to sell products online? Are you planning to improve brand loyalty, provide information or perhaps just to keep up with your competition?