Your cousin got Alexa. Your neighbor got Alexa. Heck, even grandma got Alexa. You may not have been one of the lucky souls to receive an Alexa-enabled device last Christmas, but fret not, the latest update of the app on Android now enables voice control. You can finally get aboard the Alexa train and speak […]

One of the greatest things about cloud-based virtualization is that updates are rolled out by providers and don’t require end users to do anything. In the latest example of this, Microsoft just drastically increased the speed of its virtual machines for almost everyone using its platform. Azure: Microsoft’s virtualization platform As a full-service cloud solution, […]

While most Office 365 apps serve a unique purpose, tools like Outlook Groups, Yammer, and Microsoft Teams can all be used to communicate and collaborate with coworkers. However, there are subtle differences in the way they can be used, and today we’ll break it down for you. Outlook Groups With Outlook Groups, every member gets […]

Two vulnerabilities, known as Meltdown and Spectre, have been found affecting almost every Windows desktop and server. Computers affected by these two vulnerabilities are susceptible to having their data stolen, such as personal photos and passwords. As a countermeasure, Windows developers have released an update for Windows users. Here’s everything you need to know. Issues […]

When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released. Let’s review […]

Undoubtedly, 2018’s first set of truly bad news involves reports about the Spectre and Meltdown bugs, fundamental flaws in computer processors that can leak highly sensitive data. Researchers say they affect a majority of modern computers, and chances are your business’s devices are also affected. Luckily for Mac, iPhone and iPad users, there are ways […]

Data security and privacy should be a top priority in this age of constant and downright dangerous cyber attacks. However, in your quest for ultimate security, don’t forget to implement these non-technical steps to shield your business’s IT resources. Cover up your webcam There must be some credibility to doing this if Facebook founder, Mark […]