Should Your Business Upgrade It’s Website To WordPress 5.0.2

Only a few short weeks ago, we wrote about the introduction of WordPress 5.0 in early December and discussed whether or not your company should upgra

Keep Reading

Are Bitcoin Bomb Threats A Serious Security Threat?

Users around the world have been receiving bitcoin extortion emails for a long time, one of the most notorious being a “sextortion” threat to s

Keep Reading

Have You Made Up Your Mind Regarding Your 2019 Technology Plan?

December 31st is Make Up Your Mind Day As New Year’s Eve approaches, it’s time to remember its other name: Make Up Your Mind Day. As the last day

Keep Reading

How To Make Your Presentations Rock With Live Captions & Subtitles in PowerPoint

PowerPoint is regaining a much-needed edge in the world of business presentations. Microsoft recently announced some new exciting and easy to use

Keep Reading

Why Business Must Have A Security Focused IT Consulting Company

When you are choosing the best IT consulting for your business, it is critical that you find a company that is extremely focused on all of the element

Keep Reading

10 Important Tips For Meeting Accessibility Standards With Email

When you launch an email campaign, you want your message to be read and understood by as many people as possible, and one way to do that is by making

Keep Reading

How To Use @Mentions In Microsoft Office

You have a lot going on during the business day and beyond, so any short-cut that adds productivity and efficiency to your day is a nice welcome. Micr

Keep Reading

Happy Wright Brothers Day – December 17

On December 17, 1903, Orville and Wilbur Wright made the first successful flight in a mechanically propelled airplane. To celebrate the accomplishment

Keep Reading

6.8M Facebook Users Hit By New Photo Bug

Facebook has just announced that a Photo API bug gave app developers access to user photos outside of the scope intended for 5.6 million users. This i

Keep Reading

Sextortion Scam Pretending To Come From Your Hacked Email Account

A recent sextortion scheme highlights the vulnerability users face when their data is stolen and used against them. The widespread threat made it seem

Keep Reading