James

31
Jan

What Happens to the GPS Location Information Collected on Your Smartphone?

Did you know smartphones collect GPS location information? Even more surprising, newer smartphone models with the latest-generation cameras will broadcast GPS location information to your digital photos online. There’s many factors to consider when it comes to GPS data privacy while using your smartphone. Here are 4 important facts about GPS data privacy to help…

30
Jan

Malware Increases 26% in the Third Quarter with Android Accounting for 97% of Mobile Threats

According to recent studies, Android smartphone owners must be careful when downloading new applications. A majority of malware is designed to target Google’s Android operating system. The F-Secure’s Mobile Threat Report found a 26% increase in the the number of mobile malware threats from the previous quarter. During the third quarter of the year, the…

29
Jan

Your Android Smartphone can ‘Now’ be your Personal Assistant.

Just short of bringing you coffee, the new Google Now feature acts like a personal assistant. Compare it to Apple’s Suri, but on steroids. Google Now can react to voice inquiries; proactively alert you of useful information such as traffic jams or warn of package delivery to your door and much more. Proactive means it…

29
Jan

Is Your IT Personnel Cheating On Your Disaster Recovery Tests?

A disaster recovery test evaluates your business continuity and disaster recovery plans to ensure they are functional and efficient in the event of a disaster. It’s critical to test your disaster recovery plan on a regular basis to ensure critical applications and operations continue operating after an interruption of service. There are three major areas…

27
Jan

Google’s Chrome App Update Can Reduce Your Data Usage!

Are you tired of finding surprise data charges on your phone bill? Google’s Chrome mobile browser could now help you avoid those extra data charges from your mobile carrier! Google is adding a new feature to its mobile browser that can reduce data usage by up to 50%. It does this by managing bandwidth and…

23
Jan

How Can Your Business Save Money by Outsourcing IT Services and Support?

Many businesses are turning to outsourcing IT as a means to reduce and control IT costs. Outsourcing IT services can minimize the number of IT personnel required, as well as decrease the cost of training staff members, thus saving money for the business. It’s simple, by using resourcing more effectively, and releasing unnecessary resources, businesses…

21
Jan

“Smart” Appliances Now Pose a Global Malicious IT Threat!

You’re probably aware of the malicious activity waiting to attack your computer and smartphone. But have you ever worried about the security of your home appliances? An Internet security firm recently discovered a global cyber-attack involving more than 100,000 consumer gadgets, including home-networking routers, televisions, and a “smart” refrigerator. While most consumers are focused on…

21
Jan

How to Maintain Your Privacy on Facebook

In today’s digitally driven world, most people spend a lot of time on the world’s most popular social networking website, Facebook. With recent events such as the controversial ad feature that compromised users’ privacy, it’s important to consider your privacy on Facebook. Here’s a few simple tips to help you stay safe on Facebook: Check…

19
Jan

Microsoft Will Reveal Plans For Windows 9 At “Build 2014”

Microsoft will unveil plans for its successor to Windows 8.1 at their “Build 2014” developer conference from April 2nd to April 4th 2014 in San Francisco, California. The company’s Threshold plans involve a release of Windows 9 around April 2015. Similar to the codename “Blue” for the latest Windows 8.1 releases, “Threshold” is the codename…

15
Jan

Always Use Private Browsing Mode To Conduct Online Financial Transactions.

Every major browser offers some type of private browsing mode: On Safari and Firefox, it’s called Private Browsing. On Google Chrome, it’s called Incognito Mode. On Internet Explorer, it’s called InPrivate. These modes are designed to keep your online activity safe from prying eyes. Despite different names and companies, all private browsing modes work in…

CONTACT US