Did You Know You Can Legally Unlock Your Cell Phone?

Did you know unlocking your cell phone has been legalized?

Did you know that when U.S. consumers purchase a new cellphone, they can legally change the network carrier the phone uses.  The bill known as The Unlocking Consumer Choice and Wireless Competition Act would repeal a Library of Congress (LOC) rulemaking determination, which…

How to Turn Off the Windows 10 Keylogger (And other Windows 10 privacy functions)


Turning Off the Keylogger Do you know? Microsoft has the power to track every single word you type or say to its digital assistant Cortana while using its newest operating system, Windows 10. The keylogger that was included in the Technical Preview last…

Your Password Is Hack-able: (And How to Fix It with Two-Factor Authentication)


How many online accounts do you have? Bank accounts, social media accounts, email accounts etc. We all use websites and mobile applications to manage money, store our information, connect with our friends, and make purchases from anywhere in the world. How many different…

Google Ups the Ante With Chrome OS

Google ups the ante with Chrome OS

In response to the roll out of Windows 10 on many of Microsoft’s netbooks, Google has upped the ante on their own offering of netbooks (called Chromebooks). In order to compete with the sleek new interface and usability of Windows 10 Google is…

Smartwatches Are Hackable

smartwatches are hackable

Gartner, Inc. forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020. A good portion of that number will be wearable devices; specifically smartwatches. Smartwatches have been gaining popularity…


CYOD is the new BYOD

According to a new study by CompTIA, bring-your-own-device (BYOD) is a trend on the downturn. The survey conducted in April and May of 375 U.S. IT professionals in various private businesses found that 53% allowed no BYOD, up significantly from 34% in 2013. The…

The EFF 2015 Government Privacy Report

electronic frontier foundation 2015 privacy report

The EFF released its latest Who Has Your Back report based on 5 basic criteria that included: Follows Industry Accepted Best Practices Tells Users About Government Data Demands Discloses Policies on Data Retention Discloses Government Content Removal Requests Pro-user Public Policy: opposes backdoors…

Google Officially Rolls Out the Ability to Undo Sent Emails

Google and Gmail officially roll out Undo Send email function

Everyone has experienced moments when they wish they could undo a sent email. Those moments where an email was sent to the wrong recipient, contained misspelled a word or name, or accidentally said something they wished they hadn’t. Starting this week, Gmail account…

How To Encrypt Your USB Flash Drive Using TrueCrypt

How to encrypt your USB flash drive using TrueCrypt software

USB flash drives are great for transporting files and documents. On the other hand, the small size and ease of mobility also has disadvantages. Thumb drives are incredibly easy to forget in the USB port and they’re small enough to fall out of—or…

Tips to Avoid Malicious Phone Apps

Tips to Avoid Malicious Phone Apps

The smart phone has become the go-to device for talking, texting, web browsing, picture taking, and even banking. Millions of phone applications (Apps) are downloaded daily to enhance the individual experience and cater to the users many needs. However, just as viruses invade…

Cloud Enabled Networks

To have a reliable and effective Network you need to succeed at both day-to-day Network Operations and managing IT change. That means different things to different companies. So we have designed our services to be modular and scalable; to include everything you will need but only when you need it.

Monthly Archive

Blog Calendar

May 2016
« Oct