The snow gently falls outside as you kick back in your Snuggie, ready to conquer that Netflix backlog… You’ve earned it! During the months leading up to winter, you vanquished any and all network security vulnerabilities threatening your digital kingdom,...
New NIST Password Guidelines Recently the National Institute of Standards and Technology (NIST) released updated best practices for creating passwords. Surprisingly, NIST’s recommendations fly in the face of what we’ve been taught for a long time about...
Sometimes you want to run a PowerPoint presentation on repeat – looping a slideshow so it can play in the background during an event, perhaps at a trade show booth. Is it possible to automatically loop a slideshow in PowerPoint? Yes! In PowerPoint, it’s easy. Open...
Spam. In some ways, it’s the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it’s also a pervasive problem that’s clogging and overwhelming the Internet’s email systems. Spam...
The answer may surprise you There’s an adage in IT circles that people — both you and your employees — tend to be the weakest link in the cybersecurity chain. But that’s not entirely true. Attacks actually come from a variety of places, with 72 percent...