REMOVE that unwanted freeware

Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of "free" applications (they get paid to do it, so you've got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and if you're not using a particular software on a regular basis, it's best to REMOVE it completely.

Bookmark the LEGITIMATE web sites you frequently visit

Here's a sneaky trick used by many hackers: they purchase and set up a fraudulent web site that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebook.com. All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of key-logger malware and virus landmines waiting for you to click on them.

Never use PERSONAL devices to connect to COMPANY data

You're a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here's something you might not know: you should never access company data, file servers, or applications through personal devices and home PCs that are not properly monitored by us.

How to spot a phishing e-mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus.

All This… For Just Five Bucks???

If you haven't tried Fiverr.com yet, you're in for a treat. Fiverr is a global online marketplace where freelancers offer to perform an amazing variety of tasks and services, starting at just $5.00.

Need a whiteboard-style video for your website? A new logo? Help creating a PowerPoint or Prezi presentation? Then you need to check out Fiverr.

Laptop, Tablet… Or 2-in-1?

Are you toting around two devices – a laptop to get serious work done and a tablet for a little Baldur's Gate or Facebook action? If you're in the market for a new laptop or tablet, it's time to consider getting a 2-in-1. Like an SUV or Swiss Army knife, 2-in-1's offer supreme versatility.

Virtual Reality – Useless gimmick, or valuable marketing tool for your business?

According to investment firm Piper Jaffray, there will be $5.4 billion worth of virtual reality devices on the market by 2025. The uses for small business are limited only by imagination. A roofing company, for instance, could, with this technology, give their prospective customers a live virtual tour of their roof, demonstrating its condition and places where they need to replace shingles – without having to climb up on it.

Conquering Connecting

"Everyone looks so much better when they smile."
– Jimmy Fallon, host of the legendary The Tonight Show

What a meteoric ride Jimmy Fallon has had to the top!

How did this son of an IBM machine repairman get to the chair once occupied by maybe the most legendary figure in comedy TV for 30 years straight, Johnny Carson?

He did it through exceptional networking.

10 Things You Must Do Now To Prevent A Costly Data Disaster

In less than 60 seconds, you are about to learn 10 things that could save you days – or even weeks – of downtime, not to mention the undue stress on your company, and potentially thousands of dollars lost, due to a data disaster…

Use this article as your checklist in a conversation with your IT company to assure that your business has the right plan in place to get back up and running quickly if and when disaster strikes.

Encryption in The Cloud – How safe is your data?

Cloud technology can add a whole new layer of protection to your data backup system. However, it's important to recognize that there's one key difference between cloud service providers that will determine how safe your data is. When stored data – aka "data at rest" (vs.