For millions of happy users all over the world, the iPad is fantastic just as it is. It’s easy to use, and there are literally over a million apps to choose from and enjoy on the App Store. But there are also people who want to escape Apple’s restrictions.
The Ashley Madison hack is simply the latest case of a big time company having valuable data stolen. It’s a trend that shows no signs of subsiding, so you would be foolish to not pay attention to it. Want to know what your business should learn about security from this scandal? Here are three important takeaways from the Ashley Madison hack that your company should take note of.
Even the most fanatical Google fan has cause to use browsers other than Chrome from time to time. After all, while Chrome might have crept a long way up the popularity scale, there are still alternatives out there – among them Firefox, Safari and even Internet Explorer.
One of the most underrated aspects of Windows 10 is Cortana. This do-it-all personal assistant is going to revolutionize the way you use your computer. Cortana operates in the same manner as Siri and other digital voice assistants, but on your laptop or PC. We’ll dig a little deeper to show you how to set up Cortana and what you can do to maximize her uses.
Recently Mike Tigchelaar joined our team and has been busy getting up to speed on our support tools and best practices. Mike is here on an 8 month co-op term as he completes his studies at Mohawk College. He is currently enrolled in the Computer Systems Technology – Network Engineering and Security Analyst program.
Earlier this year Microsoft announced that they were going to offer free Windows 10 upgrades for a year to those running Windows 7 and Windows 8.1. While Windows 10 for PCs isn’t launching until August, their marketing engine has been working hard to ensure everyone knows about it in advance! We’ve recently had some questions on the free offer, especially now that information about the offer is being pushed out through the Automatic Updates process.
Last month PCM was recognized in an industry list that annually ranks the top managed service providers (MSPs) across the globe. For our third year in a row we were honoured by being ranked within the top 100 in the small business category! We’ve been working hard over the last few years refining our service offering and striving to give great support and expertise.
There are many essential pieces of software needed to keep the modern business running, with one of the most important being the antivirus scanner. These programs are a major component in keeping your systems and computers secure from the various Internet-based threats.
Take some time and research how companies are hacked and you will quickly come to realize that there are a wide variety of methods at a hackers disposal. One of the increasingly common, and effective strategies being employed is spear phishing. In early December 2014, a new spear phishing attack was uncovered, one that has proven to be quite effective against large businesses, and could possibly target small companies as well.
With a Disaster Recovery Plan and Business Continuity Plan, businesses need to ensure that a proper data and system backup solution is in place. There are many different ways to implement a backup solution, with one of the most common being online or cloud-based backup.