The Latest Office 365 Editions: What Business Owners Need to Know

Just a month after Microsoft launched its new subscription-based Office 365 Home Premium for individual users, the company rolled out a major update to Office 365 for enterprise users, too. As with any major tech release, Microsoft has had its fair share of supporters and detractors. Most of the negative articles were focused on their licensing changes. Whether you find …

Nearly 90 Percent of Android Smartphones Are Vulnerable to Malware

Almost 90 percent of Android smartphones are vulnerable to malware, according to a 2015 study. It is not because of something that their owners are doing or not doing. Rather, these phones are vulnerable because they have not received regular security updates. The study found that Android devices receive only 1.26 updates per year on average, even though Google issues …

How to Protect Your Business from the Locky Ransomware

As TrendMicro predicted, hackers are increasingly using ransomware to encrypt businesses’ files and hold them for ransom. As a result, headlines about these attacks abound in print and electronic media, making them seem almost routine. However, the ransomware known as Locky warrants attention. It encrypts just about every commonly used file type, including PDF, text, image (e.g., JPG, PNG, TIFF), …

3 IT Areas Where Your Business Might Need Help

Outsourcing operations to IT service providers is common among small and midsize businesses (SMBs), according to a CompTIA survey. More than 70 percent of the 500 SMBs participating in the survey said that they use an outside IT firm at least occasionally. Most often, the SMBs hire the IT service providers to troubleshoot computer and network problems as well as …

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

February 5, 2016, started out like any other day for the doctors, nurses, and other staff members at the Hollywood Presbyterian Medical Center in Los Angeles, California. But by the end of the day, many of them could no longer access or update patients’ medical records. Nor could they send or receive emails. When the hospital’s IT department investigated, it …

IT Trends to Help You Stay Competitive

Staying ahead of technology trends can keep your business competitive, no matter how quickly the environment changes. Spotting new trends on the horizon — before your competitors do — can help your company develop successful innovations and be the first to bring them to market. This type of Blue Ocean Strategy thinking can give you an edge, but which IT …

How to Extract Text from Images Using OneNote

Have you ever encountered information in a picture that you wanted to copy? An easy way to get that information without retyping it is to use Microsoft OneNote. It supports optical character recognition (OCR), so you can extract text from a picture, paste the text into an application, and edit it. OneNote is part of the Microsoft Office suite. If …

4 Steps for Creating a Business Continuity Plan

Developing strategies for business growth is a cornerstone of the modern organization. Developing strategies to help avoid business loss is just as important, which means business continuity plans are critical. These documents provide detailed plans on how to keep essential operations running during an emergency in order to minimize losses. Some organizations call these documents "disaster recovery plans." Others use …

The Right and Wrong Ways to Get Rid of Old Computers

Before getting rid of an old computer, you need to make sure that all the personal and sensitive data on the hard drive is irretrievable. If personal or sensitive data falls into the wrong hands, your business could incur staggering direct and indirect expenses. The average total cost of a data breach in 2015 was $3.8 million, according to the …