by Roger McClelland | Apr 30, 2023 | Microsoft, Productivity, Software, Threats and Malware, Tips and Tricks |
Companies both large and small share this one cybersecurity problem. They have computers that are still running older operating systems. Staff might use these devices only occasionally. Or the company may be running customized software that won’t run on newer OS...
by Roger McClelland | Apr 25, 2023 | AI - Artificial Intelligence, Business Posts, Cybersecurity, Productivity, Software, Tips and Tricks |
It’s a common theme. You begin seeing these amazing CGI images of your friends on Facebook or Instagram. You think, “How can I make one?” Filters and self-portrait apps have come a long way. You can now make yourself look like Hollywood’s version of a character in the...
by Roger McClelland | Apr 20, 2023 | Business, Business Posts, Microsoft, Productivity, Software, Tips and Tricks |
Microsoft 365 is one of the most popular cloud platforms in the world, with about 345 million paid seats. Microsoft cloud tools numbers were up 32% in Q3 2022 compared to the previous year. One of the reasons for its continued growth is the suite of cloud tools...
by Roger McClelland | Apr 15, 2023 | Back Ups, Business, Cybersecurity, Exploit, Software, Threats and Malware |
The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once. There are about 140,000 hard drive crashes in the...
by Roger McClelland | Mar 31, 2023 | Managed Services, Software, Tips and Tricks |
Over the years you might have seen me mention in my ticket comments that I’ve optimized the registry in your computer. But what is a registry, and why is it important? In simple terms, the registry is a database that stores settings and configuration information for...
by Roger McClelland | Mar 25, 2023 | Business, Cybersecurity, Exploit, Managed Services, Software, Threats and Malware, Tips and Tricks |
Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies. Cloud apps are typically quick and easy to sign up for. The user often assumes that they don’t need to worry about security because it’s handled. This is...