While computer desktops and laptops are still widely used in traditional workflows, tablet use has increased dramatically in the past few years. Early tablets offered relatively limited productivity applications and awkward virtual keyboards, and weren’t capable of...
Phishing is an attempt to obtain private information such as usernames, passwords, security questions, and credit card details for malicious purposes. Phishing attacks happen most frequently via email that appears to be sent from a trusted source. While it’s critical...
What is the difference between synchronizing and backing up? Synchronization is when your data is an identical match across all of your devices. Services such as iCloud keep data (such as your contacts, calendars, reminders, notes, and other bits of data) the same...
Did you know that G Suite automatically maintains a directory of internal company users? You can view the Directory by first logging into your Gmail account (www.gmail.com) with a browser. Then, near the upper left corner of the browser window, click the word...
Javelin Strategy & Research’s 2017 Identify Fraud Study found that $16 billion was stolen from 15.4 million U.S. consumers in 2016. With all the news about hackers breaching the data centers of major corporations, including Equifax (where in 2017, private data of...
Apple Pay Cash is now available with iOS 11.2 Beta 5 (the full release of iOS 11.2 is just around the corner). While a number of easy-to-use personal cash payment services are available, such as Venmo, Square Cash, and Paypal, Apple Pay Cash works a bit differently...