Do More with Microsoft Forms
There are millions of Microsoft 365 users globally. Businesses rely on the software to power email, drive productivity, and connect to colleagues. Forms is another great tool for users of Microsoft 365. [Read more…]
by Tony Whitney
There are millions of Microsoft 365 users globally. Businesses rely on the software to power email, drive productivity, and connect to colleagues. Forms is another great tool for users of Microsoft 365. [Read more…]
by Tony Whitney
Your computer is down for the count. You’ve tried the perennial favourite – turning it off and back on again – but somehow, your tech magic has not worked this time! You need help, and you want it fast. The question is whether to take it to a local computer business or big-box store for repair. [Read more…]
by Tony Whitney
Nobody likes to be told what they can’t do. Still, there are certain never dos that you should keep in mind when it comes to your work computer. This article captures the top six things you should avoid doing on your work computer. [Read more…]
by Tony Whitney
Fresh-baked cookies are yummy, but you may not have the same positive associations with cookies on your computer. Here’s what you need to know about cookies and what they mean for your internet browsing.
Cookies have been around for a long time, but new laws now require websites to ask for your permission to use them. You’ve likely noticed more sites informing you that “this website uses cookies,” and they’ll ask you to click to accept the use of cookies. But what exactly are you agreeing to? [Read more…]
by Tony Whitney
The term “virus” is often used to describe many different types of infection a computer might have. Virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common are they are typically designed to cause damage, steal data, or spread across the network.
Malware describes software designed to act maliciously on a personal computer. The name ‘malware’ is a shorthand for ‘malicious software’ and describes exactly what it is. A computer virus is a single type of malware that can cause harm to your PC, but it is only one of many. [Read more…]
by Tony Whitney
The best way to avoid a computer virus is by using common sense, but that doesn’t mean you’ll be safe from attack. Even the most careful user can find themselves infected in an instant and spreading the virus faster than a sneeze in flu season. It’s why antivirus software is still the first package we install on all systems – because you never know when you’ll be attacked. But should you choose free or paid antivirus? [Read more…]
by Tony Whitney
You’d be right in thinking it’s hard to program a computer virus that can spread across the world in a flash – we’re talking days of constant desk-jockey nerd-work. So why do they bother? Well, it generally comes down to 3 reasons: Money, showing off their skill, or to simply being a jerk. While showing off or being a jerk is pretty self-explanatory, the money side is fascinating.
Here’s how people are making money with computer viruses: [Read more…]
by Tony Whitney
Trust is the foundation of a good relationship – you trust friends to be loyal, sincere, and honest. But when you blindly trust online friends, you could be opening yourself up to cyberattack.
When you hear about a big data breach on the news, you may think you don’t need to worry. You may think, “I don’t do business with that company, so the crooks can’t steal my identity.” Or “my email address and password weren’t involved, so it’s not my problem.” Yet it could be. [Read more…]
by Tony Whitney
Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used. [Read more…]
by Tony Whitney
The executives of your company are the big fish in your sea. Yet cybercriminals think of them as whales. In fact, whaling is a new cybersecurity threat targeting the C-suite level.
You’ve likely heard of phishing attacks. Phishers use scam emails or spoofed websites to obtain user credentials or financial information. This might be an email that looks like it is from your bank asking you to log in and update your details, or a supposed tax alert needing immediate action. [Read more…]