Lights, Camera, Action!

Tips for a Successful Web Video Conference In the post-Covid world of the distributed workforce, most folks have participated in a Microsoft Teams, Cisco WebEx, Zoom, and/or GoToMeeting web conferences by now. Most of those participants have also experienced distractions, difficulties, or just plain weirdness. Like in the movies, a lot of components have to come together to create a blockbuster and to avoid having a huge blooper reel.     Pleas...

Microsoft 365 Mobility

The last 12 months have seen a dramatic increase in the need to be able to work from anywhere. Thankfully, Microsoft 365’s product suite has many capabilities and features which have made it easy to do so. If you have the proper Microsoft 365 license, you can take advantage of the following features to work more effectively while not in the office. Microsoft 365 Smartphone/Tablet Apps – For your Apple iOS or Android phones and tablets, you ...

The Value of Personal Data

User data has become more and more valuable to the bad guys. One report showed that crooks are able to get up to $200 for personal data on the dark web. The aforementioned report also stated that credit card credentials are worth approximately 10% of the total line of credit.  This data can be used in numerous ways such as the creation of a stolen identity, “doxing”, financial scams, or even corporate marketing. Make sure that you protect your data...

Passwords – To Infinity and Beyond

How many digital accounts/passwords do each of us have now?The answer is too many to count, and it seems that the number is ever increasing. Password management application provider, Dashlane, says that the average internet user has 200 digital accounts protected by passwords. What is even more alarming is that this number could double to 400 in the next 5 years.  To ensure that you effectively safeguard your accounts, please review the following...

Malware Phishing – The Macro Attack

According to Webroot, malware phishing using macros is one of the most widely used forms of phishing attacks. These attacks include emails with attachments of Microsoft documents (Word, Excel, etc.). Upon opening, you are requested to enable macros (see screenshot). When enabled, these macros execute code which releases a payload that infects the user’s computer. This payload could install ransomware, delete your data, or steal information from you. ...

Cool And Easy Windows 10 Functionality – Taking a Screenshot

Taking a screenshot from your Windows 10 laptop or desktop is very simple and can be an extremely effective tool. Please see the following tips for quickly and simply capturing screenshots: If you want to capture a screenshot of your entire screen, the easiest way is to hit the Windows key + Print Screen key. The resulting screenshot will be saved to the Pictures/Screenshots folder on your computer. To capture just one area of your screen, hit t...

How to Use the iPhone Screen Recording Feature

Have you ever had a call from your in-laws asking for help on how to use a feature or app on an iPhone? What if you are at work and you receive a call from your “remote-learning” child who needs help with a phone, iPad, or iPod Touch related to a school assignment? Verbally assisting them can be difficult, and it can be even more cumbersome to send them numerous screenshots. Well, the excellent new iPhone Screen Recording feature (available in iOS 11 or l...

The Human Touch

Recently, Twitter saw the accounts of some its most famous account holders (Elon Musk, Bill Gates, Barak Obama, Kanye West and more) hacked and used to push out a Bitcoin scam. When all was said and done, the attack generated more than $100,000 in proceeds for the bad guys. The attack was initiated by a 17-year-old from Florida who was able to gain access to Twitter’s systems through social engineering and phishing … an approach which was not technology-b...

Think Before You Click

All of us have the tendency to get in a hurry when doing our jobs, especially when going through the copious amounts of emails that we receive on a daily basis. Whether we are trying to catch up on the emails that accumulated over our vacation, or we are just trying to manage our normal workload, our mouse can occasionally outpace our brain.   With this said, be sure to slow down and evaluate each email carefully before taking action. One bad click can ha...

Phishing Emails – The Single Best Defense

The majority of phishing emails have the objective of stealing your email account password, so that the bad guys can impersonate you and then steal money from you, your company, your customers, or your vendors.   We regularly cover the ways in which we can identify a phishing email (click to review a blog entry on identifying phishing attempts), but there is one sure-fire way to avoid having your account compromised. If you are ever prompted to en...