Blog

Stay up to date with the latest technology trends, news, and tips

(Tech) Android Tablet

Tech Tip Tuesday – Summer Heats Up…

Some important things to remember as Summer Heats up… Do not leave your electronics in a hot car or exposed to direct sunlight for a long period of time. Laptops, tablets, mobile phones, cameras, and other electronic devices do not deal well with high temperatures. Batteries and other components inside the device can leak and

Read More »

Tech Tip Tuesday – Summer Heats Up…

Some important things to remember as Summer Heats up… Do not leave your electronics in a hot car or exposed to direct sunlight for a long period of time. Laptops, tablets, mobile phones, cameras, and other electronic devices do not deal well with high temperatures. Batteries and other components inside the device can leak and

Read More »
(Tech) Cloud-Office 365

#QuarantineReady – Work from Home Tool Kit

Unexpected changes can be challenging to manage. If you are finding the transition into social distancing and remote work hard to navigate, we’ve collected some resources and tools that you may find useful during these times. As always, you can call upon our team to start #makingtecheasy for YOU. Remote Toolkit Resources: • LinkedIn Learning

Read More »

#QuarantineReady – Work from Home Tool Kit

Unexpected changes can be challenging to manage. If you are finding the transition into social distancing and remote work hard to navigate, we’ve collected some resources and tools that you may find useful during these times. As always, you can call upon our team to start #makingtecheasy for YOU. Remote Toolkit Resources: • LinkedIn Learning

Read More »

MC3 Cyber Situational Awareness Message (SAM) – Phishing incident targeting payroll

[img src=”/wp-content/uploads/sites/1097/2018/03/blog-img-mc3-cyber-situational.jpg” class=”aligncenter”] Overview: The Michigan Cyber Command Center (MC3) is aware of multiple incidents in which phishing campaigns were used to obtain user account credentials. Once this information was obtained, malicious actors accessed employee payroll accounts and rerouted payments to another financial account. In one of the more recent incidents, hospital employees were targeted.

Read More »
Security

MC3 Cyber Situational Awareness Message (SAM) – Phishing incident targeting payroll

[img src=”/wp-content/uploads/sites/1097/2018/03/blog-img-mc3-cyber-situational.jpg” class=”aligncenter”] Overview: The Michigan Cyber Command Center (MC3) is aware of multiple incidents in which phishing campaigns were used to obtain user account credentials. Once this information was obtained, malicious actors accessed employee payroll accounts and rerouted payments to another financial account. In one of the more recent incidents, hospital employees were targeted.

Read More »

Equifax – what we must do now!

The September 7th 2017 announcement of the Equifax data breach is a wakeup call that should be heeded not just by those whose data may have been stolen, but by ALL Technology Users worldwide. This attack was predicted, but only in the general sense, like the predictions that California will suffer a massive earthquake sometime in the future. 

Read More »
(Tech) Security

Equifax – what we must do now!

The September 7th 2017 announcement of the Equifax data breach is a wakeup call that should be heeded not just by those whose data may have been stolen, but by ALL Technology Users worldwide. This attack was predicted, but only in the general sense, like the predictions that California will suffer a massive earthquake sometime in the future. 

Read More »

Electronic Business Cards and Outlook

Email “signatures” are a great place to list your contact information but there is a better way for you to share this vital info with your business partners. The problem comes in when a user is trying to transfer this info from an email signature into their address book. To do so they have to

Read More »

Electronic Business Cards and Outlook

Email “signatures” are a great place to list your contact information but there is a better way for you to share this vital info with your business partners. The problem comes in when a user is trying to transfer this info from an email signature into their address book. To do so they have to

Read More »
Archives
Scroll to Top