What’s up, doc? We know you want to make sure we show up for our appointments and procedures, but we also know you can do a better job of reminding us.
Continue readingSearches, Politics and The Scales of Justice
What do online searches have in common with politics and the scales of justice? Somebody is usually trying to tip the balance for economic gain.
Continue readingPrivacy vs. Privilege
So, you want to block ads and pop-ups? That’s fine – because we’ve identified ads and pop-ups as gateways for hackers to penetrate your systems and networks. But even the safe ads and pop-ups can be annoying and an intrusion on your privacy.
Continue readingKaseya Ransomware Hack Sets off Holiday Fireworks
It took a perfect storm of cleverly written software, one weak link and a holiday weekend in the United States to launch the world’s largest ransomware hack to date. As this was written, some 1,500 businesses were being held up for a total of $70 million.
Continue readingPlan Your Hardware Purchases
If you’re looking to buy 50 Dell laptops for your business or a 32-inch curved monitor, you’ll likely be able to read a few issues of Technology Update before you’ll read an email with a delivery date.
Continue readingMicrosoft Windows: When a 10 isn’t Enough, Score an 11
When Microsoft rolled out Windows 10 just a few short years ago, they said that would be their last operating system (OS).
Continue readingDon’t Let Encryption Push Your Data off the Cliff
We seem to value our data so much, that we’ll encrypt it to protect it from anyone who might steal it. But if we don’t handle encryption and backup properly, our data can be irretrievably lost.
Continue readingCover Your Apple Tracks with iOS 14.5 Feature
Are you tired of apps tracking you across the face of the earth? Are you fed up with being just bits of data? Are you wary of the extent someone might go to sell something – no matter how much you might need it?
Continue readingDid We Learn Anything from Colonial Pipeline?
Today, the gasoline shortages caused by the ransomware hack of Colonial Pipeline are in our rearview mirror. Hopefully, the memories are not forgotten. There are things we can all do to make it harder to access and hold our data for ransom . . .
Continue readingTake Control of Your Email
You can probably guess the age of anyone who has an email address that ends in aol.com or yahoo.com. They were around when the “Information Superhighway” . . .
Continue reading