-

Back to school? 9 cyber safety tips for school devices and more
August and September are big back to school months in the United States and while you’re prepping your children’s backpack for their return with pencils and markers it’s also worth taking the time to go over safety tips for utilizing the internet. Schools have become more and more steeped in their usage of technology rather…
-

The 7 most common network issues and how to fix them
“The internet is down” is a phrase no one enjoys hearing. Beyond the disruption to your day, troubleshooting network issues is also a notoriously frustrating experience. Questions like why is it down, is it us or our service provider, when will it come back up? are common place in this universally shared experience. These questions…
-

Code named “Strawberry”, OpenAI’s latest update aims to boost reasoning capacity in their AI model
Initially labeled Q* for Q Star, Project Strawberry is set to become ChatGPT5 and OpenAI is prepared to launch this update any day now at the time of writing. AI competition continues to stiffen up, but many would argue OpenAI has a commanding lead in the AI space with it’s a comparatively more mature model…
-

The day the world stopped (for Windows users anyways)
Unless you’ve been living under a rock for the past week, you’re probably well aware of the worldwide outage that occurred last Friday effecting millions of Windows users and causing disruptions for airlines, healthcare facilities, banks and more. CrowdStrike, a cybersecurity technology company that provides endpoint protection and cyberattack response services to numerous Fortune 500…
-

4 Ways to Secure Your IoT (Internet of Things) Devices
Love it or hate it, internet connectivity in everyday devices is here to stay. Whether you’re a staunch believer that “smart” devices are unnecessary or if you are just waiting for the day when the 1999 Disney movie “Smart House” becomes a reality (minus the over reactive AI of course) – chances are you have…
-

Are IT audits part of your technology business planning? 5 tips for completing a technology audit on your business
If technology audits aren’t a regular part of your business planning or you’re not sure where to begin, today’s article will include advice on both the process of conducting a technology audit and what your technology audit report should include when you’re done. Before we touch on those topics though we should cover what a…
-

Ransomware attack brings down auto dealers across the country, bringing car sales to a halt
Software creator CDK Global experienced a ransomware attack last week that left auto dealerships that use the software they distribute (Dealer Management System or DMS) unable to process car sales as they normally do. The DMS software is used by over 15,000 dealerships nationwide and not only helps car dealerships quickly process applications but also…
-

Our top 10 best tricks for using Microsoft Outlook every user should know
Microsoft Outlook is a feature found in their Office line of software and can be used standalone or as part of your overall Microsoft 365 subscription package. It can be used as a mobile app, a desktop app or even within your browser and has many competitive features that make managing your business’s email easier…


