Rich Weber

30

Jun2016
With cloud storage being used more and more often for personal and business purposes, it’s normal to wonder how secure your files are in programs like One Drive and SharePoint Online. While it is possible for a hacker to access such secured cloud storage, it is highly unlikely to occur. ... Read More
June 30, 2016Rich Weber

07

Jun2016
Despite frequent and incessant calls to safeguard email and other online accounts, many do not realize the significance of such protective actions. Because it is nowadays convenient, people often use their Google accounts for a number of business and personal activities spanning from checking email to financial transactions, and these ... Read More
June 7, 2016Rich Weber

02

Jun2016
A Distributed Denial of Service (DDoS) attack prohibits access to a computer resource. This kind of assault rarely happens alone but rather occurs in waves once an attacker realizes they have been successful in the first attempt. Using the same method of attack on a business’ computer system, such cyber-attackers ... Read More
June 2, 2016Rich Weber

26

May2016
First introduced last November to First Release customers, Microsoft has now rolled out access to Office 365 Connectors to the general public. If this sounds like Greek to you, know that you are not alone. Office 365 Connectors deliver relevant content to Office Groups in a real-time and interactive way. ... Read More
May 26, 2016Rich Weber

10

May2016
With most business operations tied to the internet, it is important to consider a backup plan in the event that your internet connection goes down. A host of things can cause issues with Internet service from natural disasters to provider caused issues, and unfortunately, those are beyond your control. Choosing ... Read More
May 10, 2016Rich Weber

18

Apr2016
If you have concerns about the security of your business documents on Office 365 or on-premise servers, Azure Rights Management (Azure RMS) may be the solution. This new and innovative technology ensures you have a complete control over your business documents that is extended even after these files are shared ... Read More
April 18, 2016Rich Weber

14

Apr2016
With some reports estimating over seven million incidents of cybercrime and online fraud occurring in 2015, it would be a mistake to discount the risks associated with using a wireless printer. After all, anytime data is transmitted wirelessly, there is a chance it could be intercepted. When you think about ... Read More
April 14, 2016Rich Weber

30

Mar2016
As we become more and more connected to the internet in our day-to-day lives, the days of having dedicated devices to one purpose are fast disappearing. Our means of getting online are most often portable and take on ever-increasing forms, including laptops, tablets, and smartwatches. For WiFi networks, this onset ... Read More
March 30, 2016Rich Weber

29

Mar2016
Especially now that the coveted .com and .net domain names are dwindling, URL addresses are hot real estate. If you have one or more domain names that are associated with your business, you want to ensure nothing happens and no one snatches them from you. You may initially wonder how ... Read More
March 29, 2016Rich Weber

25

Mar2016
Although a sizeable number of users have installed the new operating system Windows 10, not all of them know its full capabilities. Multitasking is one feature: this latest Windows version allows users to easily switch back and forth between projects. Task View is a virtual desktop feature that creates a ... Read More
March 25, 2016Rich Weber