The September update of Office 365 includes some major additions and changes to tools such as Microsoft Teams, PowerPoint, and Excel, just to name a few. It is important to keep up with these developments, so here is a list of the major advancements of which you need to be aware. Microsoft Teams:...| Read More

Facebook Was Breached Were You Or A Facebook Friend Affected? Facebook has confirmed that more than 50 million user accounts have been breached. They made the announcement today, Friday, September 28th.  However, their engineering team discovered the security breach back on Tuesday, September 25t...| Read More

OneNote is a free application from Microsoft that allows you to collect notes in a variety of formats – handwritten text, typed text, digital drawings, photographs, links, screenshots, videos, and audio files – and organize them, share them, and use them to create other documents. OneNote is an ...| Read More

Online security is something that should get everyone’s attention. Threats exist all around us: ransomware, viruses, spyware, social engineering attacks and more. There’s so much you need to know to keep your personal and business information safe.   But… where do you start? As trusted cy...| Read More

More than ever, it is necessary for legal professionals to remain digitally connected. As technological advances are made, attorneys and support staff should endeavor to remain up-to-date. This means staying current by investing in the newest generations of digital devices, including phones. With so...| Read More

More than ever, it is necessary for legal professionals to remain digitally connected. As technological advances are made, attorneys and support staff should endeavor to remain up-to-date. This means staying current by investing in the newest generations of digital devices, including phones. With so...| Read More

According to Statista, there were 184 million ransomware attacks in 2017 and the average ransomware demand is over $1,000. Individuals, organizations, and companies have fallen victim to these attacks. Most people recognize the fact that ransomware is a danger, but they may not realize that it can a...| Read More

Profile – Viewing – Searching We get questions from our clients about using LinkedIn all the time. And we get so many that we’ve been keeping track of some of the most commonly asked ones. We’ve posted three of them here with detailed answers for you. 1. “Is There A Way To Change How My...| Read More

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including desktops, servers, and laptops)...| Read More

As software and digital applications (Apps) continue to be developed, Internet Technology (IT) is embraced by a variety of fields that have hitherto ignored it. In law firms across the country, the old ways have been honored as traditional, respectable, and perhaps even better than modern methods. I...| Read More