Most VPN applications available in the app stores for your mobile devices are actually spy apps. Let me try to explain something that is very technical, in a hopefully clear manner
Small Tech Notes
The benefits in helping us, even as a small company, understand our staff just a little bit better are priceless. I would encourage you to participate in reputable, local opportunities like this.
Ericka Branon and Greg Bastien have joined the company
Social engineering is the most powerful weapon of the hacker. They use psychology against you. It’s hard not to fall for it. Anyone can
If you’d like your staff to have a 15 minute tutorial on this new procedure, let us know. We’re happen to schedule an online meeting that they can attend for a first hand demo and opportunity to ask questions.
which threats are on the increase,
what’s being done about,
what your staff needs to know and
our plans for improving security and education offering for your staff.
Join us on March 2nd at Noon for a 30 minute Cyber Security Review training. We’ll remind you of what to look for and how to avoid falling for the trick. We’ll also review what to do should the worst happen.
Writing and digging through files and email for information is one of the top time sinks that people report. This is what Context IQ aims to solve
Questions about these changes should be directed to Ted or Amy. Our techs, while very helpful capable individuals are not burdened with keeping up with licensing and pricing changes.
When you highlight a group of cells, Excel will use publicly available data to help you add facts to your Excel sheet without having to search around on the Internet for the data.