Scammers are creating new scams just for VoIP

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. Naturally, shrewd scammers have found a way to use VoIP as a means to carry out ‘vishing scams,’ a new type of phishing whereby fraudsters make phone calls, pose as a business or financial partner, and request private details. Understanding these scams well is your best shot at beating them.

Read more...



Showdown: Office 2016 vs. Office 365

Understanding how Microsoft 2016 and Microsoft 365 differ and deciding which one is right for your business can be difficult. After all, they both have similar names and come with just about the same applications. So how do you tell the two apart?

Read more...



Creating a Cyber Secure Home

You spend time and money protecting your computers at work from hackers, malware, viruses, and general cybercrime. Protecting your home computer network is just as important as maintaining a secure work environment, and not all home computer users may be aware of all the dangers lurking beyond their screen and keyboard. This poster provides five important steps on how family members can help to create a cyber secure home and protect your home network from the same dangers that exist at work.



What can users expect with Microsoft Edge?

Microsoft Edge has replaced Internet Explorer as the default web browser on Windows 10. Edge offers plenty of new features that optimize web searches and ensure a seamless transition from any web browser. Here is the rundown on some noteworthy features:

Read more...



Tips and Tricks

Tip #1 – Delete E-Mail from Directly from the Pop-Up Notification

Tip #2 - Outlook Quick Steps - Email Management Time Saver

Tip #3 – Useful iPhone Tips