5 Ways to Declutter and Customize Windows 10’s Start Menu

A common complaint about Windows 10’s Start menu is that it is cluttered. Both the app list and tile area contain so many items that it is hard to quickly find what you need. The clutter is largely due to redundancy and the extra items that Windows automatically adds to the app list and tile area. Fortunately, the Start menu …

How to Find Out Basic Information about Your Windows Operating System

Like most people, you probably know the name of your Windows operating system (e.g., Window 10, Windows 8), but do you know the edition, version number, and whether it is a 64- or 32-bit system? Having this information is helpful when you are experiencing a problem and need to discuss it with an IT consultant. It also comes in handy …

Cybercriminals Are Creating Fake Banking Websites That Look Like the Real Deal

Banking trojans have been around for years. If your computer is infected, the trojan waits until you visit your online banking website. When you do, it redirects you to a malicious website that looks like your bank’s site. If you enter your banking credentials, they will fall into a cybercriminal’s hands.In the past, you could usually spot a fake banking …

Backup as a Service (BaaS) vs. Recovery as a Service (RaaS): 2 Major Distinctions

It seems like everything has the “as-a-Service” designation after it these days. As-a-Service products are changing the way companies procure and manage their IT. Two of the newer entrants to the as-a-Service scene aim to keep your important company data safe and available to you, no matter what. Backup as a Service (BaaS) and Recovery as a Service (RaaS) both …

Microsoft Will Soon Stop Supporting Many Business Apps

Many Microsoft business apps are reaching the end of their lifecycles in the fourth quarter of 2017 and in 2018. When the apps reach that point, Microsoft will no longer support them. The soon-to-be-unsupported apps include the following Office products: Office 2007 Suite, including the apps (e.g., Word 2007, Excel 2007) sold separately (support ends October 10, 2017) Accounting 2008 …

How Former Employees Can Pose a Big Threat to Your Data

Data breaches instigated by former employees do not gain as much media exposure as those caused by cybercriminals. However, these insider attacks can pose a significant threat to companies’ data as well as their bottom line, as the following examples demonstrate: Over a two-year period, the co-owner of an engineering firm accessed the servers of his former employer (also an …

5 Ways to Protect Your Web Browsing Data Now That ISPs Can Sell It

If you live in the United States and you are using a U.S.-based Internet service provider (ISP), you need to know about an important change made to Federal Communications Commission (FCC) rules. In April 2017, U.S. lawmakers repealed several FCC rules that would have required ISPs to get customers’ consent before selling their web browsing data to advertisers and other …

What You Need to Consider before Adopting a BYOD Policy

Companies often let employees use their own devices for work. One study by Crowd Research Partners found that 72% of the 800 companies surveyed allow at least some employees to do so. While Bring Your Own Device (BYOD) policies are popular, adopting this type of policy is not a matter of simply telling your employees they can use their own …

Locky Ransomware Is Back in a Big Way

After taking a brief hiatus, cybercriminals launched four new Locky ransomware attacks in August 2017. The biggest one occurred on August 28. In a span of just 24 hours, hackers sent out more than 23 million malicious emails, making it one of the largest malware campaigns in the latter half of 2017, according to AppRiver security researchers. The Phishing Emails …