Blog - Struggling With Email Overload?

Struggling with Email Overload?

Email has allowed us to send and receive messages more easily than ever before. While this is a good thing, it can lead to problems. You may receive dozens or even hundreds of emails in a day. At this point, it feels like you’re wasting your entire day dealing with those incoming messages. Even worse, it makes it difficult to find important messages in your inbox. You can quickly become overloaded with emails. So how can we deal with this overload? The first step is to reduce the number of emails you receive overall and there are a few ways to do this.

Blog - Old vs new computer - repair, upgrade, or replace?

Should You Repair, Upgrade, or Replace Your Computer?

Like many valuable things we buy, new computers suffer from wear and tear over time. Our computers are particularly vulnerable as we have placed more and more demands on them every year. New machines have got faster, quieter, more reliable, and more capable over time. At the same time our own computers have begun to slow and sometimes even stop performing altogether.

Blog - Getting your computer infected with malware

Your Complete Guide To Getting Yourself Infected With Malware

If you want cyber crooks to stalk your online activities, collect your passwords and sensitive financial information, hold hostage all your personal files or harness your computer for any number of nefarious activities, then you should follow these five steps. They’ll get malware on your computer in no time.

Of course, nobody wants any of these so read this and don’t do it!

Blog - Disposing of old computers with confidential data

How To Securely Dispose Of Old Computers

Getting new computers for your home or business is exciting, but what happens to the old ones? Depending on the age, some people sell them, others throw them out. That’s the easy part. The problem is the sensitive data on them. There are passwords, account numbers, browser history, personal documents and pictures… If you run a business, you might also have license keys, customer details, medical information, tax returns… well, pretty much everything! Each computer, whether laptop, tablet or desktop, contains a treasure trove of sensitive information that cyber-criminals would love to get their hands on.

Blog - Office 365 - on laptop, tablet and phone

3 Reasons Why All Homes Should Have Office 365

Microsoft Office has been THE office suite for more than a decade, whether it’s for business or students doing their homework. Other applications have come and gone, but it’s expected that most people will be doing their work in Word, Excel or PowerPoint. While you may have an older version of Office that you love, there are three good reasons you should upgrade to Office 365.

Blog - Can Private Browsing Protect You Online

Can Private Browsing Protect You Online?

Maintaining your privacy while using the Internet has become more challenging over the years. The recent Facebook privacy scandal made that abundantly clear, with users shocked at how much information had been recorded about them. While it’s almost impossible to enjoy the Internet and leave zero digital footprints, there are things you can do to hide your online activities – some more effective than others.

Blog - Most accounts use duplicate password

Got a Bad Case of Password Exhaustion?

You’re not alone! Most people use the same password everywhere – home, work, Gmail, Facebook… even for banking. Considering how many passwords we’re expected to remember and use on a daily basis, password exhaustion is a very real thing. It’s no wonder that when yet another prompt for a password appears, users enter easily guessed combinations like ‘abcd’ or ‘password’. And when it’s time to change the password, many just add number 1, 2, and so on to their previous password.

Blog - Tech support scammer

How To Spot A Tech Scam Before You Get Stung

If your computer had a virus, you’d want to know about it ASAP, right? Your important files could become corrupted, you could lose your photos and your digital life is essentially destroyed. Even thinking about it is terrifying.

Tech scammers know we’d be lost without our computers, and that we don’t always know what’s going on behind the screen – which is why they’ve been able to swindle millions from every day people across the world.

Blog - Incorrect Apple ID or password error message

Incorrect Apple ID or Password when setting up a new iPhone or iPad

Recently, I finally bought an iPad. I figured that a lot of my customers need assitance with one and while I’m often able to resolve their technical issues, I wouldn’t call myself a confident user and up until recently, didn’t even know how to switch between different apps without launching them again, how iCloud works, how to customize the interface, how to connect one to any other Apple device and so on.

Blog - What’s That Weird Noise Coming from Your Computer

What’s That Weird Noise Coming from Your Computer?

New computers are whisper quiet, seeming to run on pure magic, but after a while computers can start making some pretty weird noises. Clicks, clunks, and about-to-take-off jet noises are the most common, but when should you worry? Your computer has a number of moving parts and even some stationary parts that can make noises. If you’re listening, your computer might be telling you about its current health and how you can help it run smoother, for longer.