Our 4 favorite web browsers

Internet browsers are a unique type of software. No two browsers share the same list of features and functions, and almost all of them are free. That means you have a lot of options when choosing which is right for you, and that decision isn’t always clear cut.

Hackers use browsers to get credit card info

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases online more convenient.

The latest Cloud Print service from Google

Not too long ago, the thought of being able to access printers from your computer, tablets or smartphones was almost unheard of. But today, it’s a completely different story — enter Google’s Cloud service. Now you can access both regular and Internet-enabled printers through the web.

Statistics for cyber security during 2016

As cyber attacks continue to rise, businesses large and small need to stay one step ahead with IT services that keep them protected no matter what. What once were minor nuisances have now become advanced threats that can actually put you out of business.

2017 IT essentials: disaster recovery plan

When disaster strikes, organizations need to put their business continuity plans into action and recover their IT systems as quickly as possible. Failing to do so can mean serious financial and reputational repercussions. Despite this, investments in disaster recovery are set aside each year for high-tech IT investments, and every year companies and employees continue […]

The ransomware that makes you sell your soul

Ransomware has become a fast-track for making money for some hackers this holiday season. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need.

Gooligan malware haunts Android devices

It is the largest single theft of Google accounts ever reported. And if you own an Android 4 or 5 phone, it has likely already affected you. The Gooligan virus, running rampant in third-party app stores, promises to keep wreaking havoc until developers find a way to shut it down.

New year, new cyber-threats

Have you had to deal with security issues in the past year? Brace yourself, as there are more to come. For this reason, security experts have become indispensable members of society, who guard tech-dependent individuals and businesses against malicious attacks that pose threats to their privacy and livelihood.

A guide to choosing small business computers

Is having the best computer for your small business really that necessary? The answer is a resounding yes. Given the changes in the business environment, entrepreneurs are fiercely competing for a place in the hearts of consumers. And that requires having the right kind of computers.

Easy tips for preventing a costly data breach

Business technology has become one of the most important components for successful companies big and small. In an overwhelmingly digital landscape, businesses depend on IT for marketing, data storage, and financial transactions. And with that comes the need to secure every bit of private information cyber criminals might want to feast their eyes on.