OneDrive is your new cloud shared storage directory that support hundreds of file types. Access OneDrive: Go to office.com and logon. Click on the “Waffle” icon at the top left > click on OneDrive From this location you can upload files, create folders and share information with coworkers and clients. Office.com is the easiest place to setup shares… Read More »
When signing into Office 365 it is important to go to www.office.com first and sign in. Here you can download software, access cloud based apps, but more importantly, you will setup multi-factor authentication.
On your iOS: 1) Go to Settings > Passwords & Accounts 2) Tap on the email account you need to update > Tap Account at the top 3) Enter your new username > Done On your PC: 1) If out of the office connect your VPN 2) from the start menu click on the avatar on the… Read More »
For Verizon customers, this app does a good job of blocking unsolicited calls. It provides real-time alerts and automatically blocks known offenders. The$3 subscription is not necessary for the basic level of protection. Download
After updating your iOS you may experience issues such as: Attachments not downloading. Calendar invites showing up as .ics files. Contact searches running very slow. Unread items showing incorrect count. Email only downloading the first few lines.
Wireless headsets can be a great enhancement to your daily productivity. The Jabra Engage 75 connects to your PC, Mobile and desk phone. For those that travel the Jabra Evolve2 85 is a great over the ear solution.
This PowerShell code creates the American Flag:
Teams is a great tool for real-time collaboration. It allows your office to call, chat and meet one place. Chats are persistent and can be secured to limit access.
If your data is stored on a Windows server it is preserved for a limited time by a service called Shadow Copy. To access these files: Open File Explorer > Navigate to the original location of the data you want to recover. Right-click in the open space of the folder > choose Properties > Previous Versions (Tab) Select… Read More »
Workstation class laptops usually have two GPUs. The onboard Intel integrated GPU and a dedicated NVIDIA graphics card. When this is the case you need to make sure that your high-performance applications use the NVidia GPU, rather than the low-performance Intel integrated GPU. To ensure optimal application performance make the following adjustment:
Beginning with iOS 13 you can connect a Bluetooth mouse or Bluetooth keyboard & mouse combo to your iPad. Here are the steps: Go to settings > Accessibility > AssistiveTouch > Devices > Bluetooth Devices Place your device in pairing mode and select it from the iPad menu. Go back to AssistiveTouch and turn it on.
In order to protect yourself on the Internet, you need to be proficient at locating and identifying domain names. This is because, emails and attachments can be used to redirect you to sites that are loaded with bad content. Make sure you can: Verify the email sender. Verify any link contained in the message or within an attachment… Read More »
Editing Files in Another App Remember that FileBrowser can preview a variety of file formats such as Excel, PDF & Word. If you tap on the file in FileBrowser, it will open in preview mode. If you want to edit it in another app, Do Not preview, Do Not tap on the file name. Tap the vertical ellipsis… Read More »
The “Grandparent Scam” is a particularly disturbing scam perpetrated on the elderly. The criminal contacts the Grandparent, pretending to be a grandchild in trouble with the law or in desperate need of cash for a medical bill. They then claim that the matter cannot be discussed with other family members (red flag). Victims report receiving calls late at… Read More »
Applications like InDesign and AutoCAD interlink files as you create content. This allows teams to share workloads, provides more efficient file storage and adds greater stability to the software platforms. These linked files can create an issue when multiple entities work on the same file or when content is moved to a new location. The solution to this… Read More »
This is the mobile version of Keepass, our recommended desktop password management tool. You can use iTunes on your PC or Mac to transfer your password database to your iOS device periodically. This will give you mobile access to your passwords without ever placing them at risk in the cloud. This can also serve as a backup location… Read More »
Grammarly is a writing assistant that can spell-check your web-based content as you write. It can be loaded as a firefox browser plugin for free. It offers advanced functionality, with a monthly subscription, to evaluate your writing in the areas of tone, engagement, clarity, and grammar.
When creating an e-mail signature in Outlook or sharing a word or excel file, it is important to remember that fonts are not common across all platforms. If you use a font that does not on exist on the recipient’s device, your signature or files appearance will change as the font you selected is replaced with a default… Read More »
360 degree images and video are incredibly easy to create and share, with the right tools. The latest 360 camera from Ricoh is the Theta V. The camera can capture both images and video. It can be controlled remotely from an iPhone and instantly transfer images and video. With the right wordpressplugin, you can post images or create… Read More »
When you have a weak wireless signal, you can try and boost it in a couple of ways: Make sure the wireless access point (WAP) closest to you is not obstructed. Clear away any dense objects within a foot of the device. You might also reposition it to boost the signal. Make sure your device in not in… Read More »
A business may be held liable for all or a substantial portion of any loss when checks are stolen or altered. Positive Pay is an automated check fraud detection service offered by most banks. It matches the payee, check number and dollar amount of each check presented for payment against a list of checks issued from your accounting… Read More »
Tips, from the FBI, to avoid becoming a victim of cyber fraud: Do Not Do not give unknown, unverified persons remote access to devices or accounts. Do not communicate with unsolicited email senders. Do not act in haste. Criminals create a sense of urgency to produce fear and lure the victim into immediate action.
There is a great deal involved in maximizing the performance of your laptop or phone battery. GPS, Temperature and screen brightness all play a role. This Page from Apple details how to optimize each device.
Whether you are in a hotel, airport or a coffee shop, WiFi can be spotty. The most common cause is the requirement for you to agree to an acceptable use policy on each device. This must be done before you can connect to your email or VPN. To do this, launch your browser and go to a new… Read More »
Apple announced the new features of iOS 13 More here… Do not be the first to upgrade. Turn off Automatic Updates: Settings > General > Software Update > Automatic Updates > Off
Click more to view or download it.
Your current Illinois driver’s license will not be accepted at airports, military bases and secure federal facilities after Oct. 1, 2020. You can obtain a REAL ID card or use a passport after that time. To see what documents you need to apply for a REAL ID, visit the REAL ID Interactive Checklist. All Driver Services facilities are… Read More »
Hackers are using the familiar Apple settings icon to trick users into hacking their own iOS devices. As I discussed in a previous post, this can permanently destroy your device. If you ever see the settings icon and a request to install, confirm or cancel, do not click any response presented. Rather, you should immediately close your app.… Read More »
The U.S. Postal Service just fixed a security weakness that allowed anyone who has an account at usps.com to view account details for some 60 million other users, and in some cases to modify account details on their behalf. This would have been less of an issue before they released their latest service called Informed Delivery, which allows users… Read More »
The Internet Crime Complaint Center received an increase in the number of Business complaints requesting false requests to purchase gift cards. The victims receive either a spoofed email, a spoofed phone call or a spoofed text from a person in authority requesting the victim purchase multiple gift cards for personal or business reasons.
Did you know that you can use Newforma to share folders on the network with outside vendors and clients? Shared folders create an online space where internal and external team members can access and share project files. This has a number of advantages over products such as Dropbox (which is a violation of some client contracts). Key features … Read More »
Office has a new look if you are on Office 365. One advantage that Office 365 offers is real-time access to the ever growing list of features that the product receives on an ongoing basis. Microsoft has also released its on-premise version of Office 2019
Freezing your credit is the best way to prevent identity theft. When your credit is frozen, no business can check it, and therefore will not allow new accounts to be opened in your name. When you need to open a new account, buy a car or home you can unfreeze your credit for a specified period of time… Read More »
If you were one of the 143 million Americans that had their data compromised in the September 2017 Equifax breach you will want to read on. According to the FBI, thieves that steal personal data park the information until it can be used with the greatest likelihood of success. Then they sell it, and you become a victim… Read More »
Attackers exploited a vulnerability in Facebook’s code that impacted “View As” a feature that lets people see what their own profile looks like to someone else. This allowed them to steal Facebook access tokens which they could then use to take over people’s accounts.
The next generation of cellular known as 5G is being rolled out on October 1. Verizon is first in the world to provide a commercial 5G service, with plans for rapid broadband internet, and 5G mobility service More Here …
Remote administration tools, such as Remote Desktop Protocol (RDP), as an attack vector has been on the rise since mid-late 2016 with the rise of dark markets selling RDP Access. Malicious cyber actors have developed methods of identifying and exploiting vulnerable RDP sessions over the Internet to compromise identities, steal login credentials, and ransom other sensitive information.