You spent plenty of hours working on your mobile site, getting it just right, only to discover Google is penalizing both your mobile and desktop sites because of coding issues that flags duplicate content. While Google is generally good about recognizing the difference between mobile and desktop sites, it is entirely possible to encounter some…
Spyware, Malware and PUPs
What do these words mean and how are they relevant? I mean come on; a PUP sounds adorable! Well, puppies are pretty adorable, but PUPs are less so. One will damage your carpet and furnishings, the other will slow down and compromise your computer. “PUP” is an acronym for “Potentially Unwanted Program” and they are…
Mobile Management Tips for Your Business
Employees have access to two or more devices in the workplace, creating a ‘bring your own device’ (BYOD) landscape that makes it imperative for businesses to examine the cross-use of personal and business devices in the office, a recent study conducted by Apperian confirms. There was a time when employers were more likely to supply…
Windows 8
Windows 8 – How and what is it? Windows 8 is the newest operating system from Microsoft, the successor to Windows 7. It provides a few new things and while keeping some features the same – it generally could be said that Windows 8 is a completely new system. Firstly, why is it new? Windows…
What Your Business Should Know About Choosing a VPN
proxyMore than 600 data breaches occurred in the U.S. last year, as well as nearly 50,000 reported security incidents, according to an annual Verizon report. A large portion of those breaches were accomplished on mobile devices, and with public Wi-Fi everywhere you turn, a VPN could make or break your data security. Photo by Ludovic.ferre…
Business and Government Get Hit by Identity Theft, Too
Banks lose millions of dollars every year by having to compensate identity theft victims, and so they’re developing new ways for consumers to protect themselves. While banks, governments and corporations are working hard to lessen the impact of identity theft, the bulk of the responsibility still falls upon the consumer. Have you ever been a victim of identity theft? How did it affect you?
Online Shopping – General Safety
Online shopping is a boon of the modern world – allowing one to purchase a wide variety of items through the Internet, and have their purchases shipped directly to a PO box or their home or business address. This of course will raise security concerns in a world of technology where anything is possible, such…
The Battle for Your Computer’s Safety
More is always better, right? Well, in most cases it is. However in terms of using anti-virus protection for your computer, one is enough. While certain programs may have better or different catch rates (How often the program detects issues), or less “false positives” (When a file is incorrectly marked as malicious) and so forth,…
Dirt and Dust – Are you destroying your computer?
Fundamentally, computers are complex machines. They can perform many tasks of modern life, but are susceptible to the same flaws as any other machine would be. Dirt and dust are mortal enemies of machines and have several troubling consequences, home and office computers included. In a list of the ten most common reasons for computer…
The Cloud
So, you may have heard of “The Cloud” by now, probably mentioned in an advert or some other form of media, but what exactly is it? Simply, The Cloud refers to the most efficient way currently to store and share information – files are stored over the Internet rather than on a hard drive or…