Yet another major vulnerability has been discovered, this time in Microsoft’s MSHTML browser engine. The vulnerability, discovered and tracked by Kaspersky, is currently being exploited all over the world. As such, it is critical that you know how to avoid vulnerabilities like this so that you do not inadvertently allow a hacker onto your network. Read More
- Published: 29 Sep 2021
Chances are, you’ve at least heard the term firewall before. A fairly recent term, it was first used as a computing term in the 1983 movie WarGames before it was ever introduced into mainstream computing. Thanks Matthew Broderick! Since then, the term has expanded and grown to include a variety of approaches. Let’s dig into
- Published: 03 Mar 2021
In part one of this tutorial we discussed the types of images you will encounter online and how they can be used. Today, we will go a little bit further and talk about how to best alter your images without sacrificing quality. Let’s dive right into it. We will be using Adobe Photoshop, but there
- Published: 01 Mar 2021
They say a picture is worth 1,000 words. If that is true (or even close to true), images can do a lot for what you are trying to accomplish online. We thought it would be useful to put together a little tutorial about the use of images online and provide some useful information about the
- Published: 01 Feb 2021
Preserving cybersecurity requires the person responsible for doing so to consider every component and connection associated with their technology, down to the smallest minutiae. Let’s consider a sizable example that comes from a narrowly avoided disaster in the Democratic Republic of Congo, that could have potentially left millions of Internet users exposed to serious threats.
- Published: 28 Dec 2020
There are theoretically countless ways that artificial intelligence can have practical applications. One that you may not have initially considered: as a content filter for Internet comments. With trolling, spamming, and other misuse of these platforms getting far out of hand, let’s consider how some platforms are using AI to fight back.
- Published: 19 Oct 2020
“To confirm you’re a human being, select all of the images that include traffic signals.” Chances are good that you’ve seen such a requirement before as you’ve spent time online, whether you were filling out a form or logging into a website. Whether it was an evaluation like the one above, or simply one where
- Published: 29 Jul 2020
Be honest: you don’t think, “I need to search for this online.” You think, “I need to Google this.” Google is the standard in online search, but so few of us use it to its fullest abilities. Here, we’re sharing a few tips and tricks to make your use of Google Search much more effective.
- Published: 03 Apr 2020
On the average business’ network, you can find many of its most important assets. As a result, any addition to that network will need to come with some solid deliberation. If you’ve been ruminating about the security or viability of your business’ wireless network, we can provide a few strategies and practices that you can
- Published: 27 Nov 2019
Certain useful business technologies, like VoIP, screen-sharing, and webinar platforms, require a lot out of your Internet connection. This means that you need to be sure that you have sufficient bandwidth to support these solutions. Today, we’re taking a look at how your business relies on having the appropriate bandwidth to support your operations, and
- Published: 17 Oct 2018
Everyone loves cookies, but browser cookies take on a whole other definition in the computing environment. Do you know what browser cookies do, as well as what their purpose is? Today’s tech term is dedicated to cookies–they might not be delicious, but they do serve an important role within your organization.