Category: Information Technology

Information Technology

SEO Poisoning and how it can affect you

SEO poisoning, also known as search poisoning, is a cyber assault tactic that involves the creation and optimization of harmful ...

How-To, Instructionals

How to Recover Deleted Files on Mac and PC: A Comprehensive Guide

We’ve all had that moment of panic when we accidentally deleted an important file. But don’t lose hope; there are ...

Information Technology

1Password Launching Passkeys!

This is great to see. A step toward being passwordless. Take a look at their blog bost at https://blog.1password.com/save-sign-in-passkeys-1password/?utm_source=sign-in-side-panel?utm_medium=direct?utm_campaign=passwordless As always, ...

Information Technology

The Troubleshooting Process and User Interaction

When we have technical problems with our devices, software, or any other complex system, troubleshooting is the process we use ...

How-To, Instructionals

How to Record a Loom / Screen Recording to help troubleshoot

Seeing can be believing. Much of the time, troubleshooting requires seeing a process to determine the best solution. Recording your ...

Information Technology

TPM Malfunction Error

The TPM is a a security device modern computers. Sometimes this device fails to communicate with the system and will ...

How-To, Instructionals

What ports are on your computer?

How-To, Instructionals

There’s a fallacy in voicemail, scheduling a call is a win win.

I have written about the inefficiency of random phone calls and, indirectly, voicemail. And it is a fallacy that random ...

Information Technology

Six Quick Tips to Increase Efficiencies

When operating at maximum efficiency, there is minimal time wasted. Increased morale and profitability. It’s a win-win situation. Identifying inefficiencies ...

Information Technology

What can you help a client with that they would never think to ask about?

An intriguing question was recently posed to me: “What can you help a client with that they would never think ...

Cybersecurity

Ten Ways to Protect yourself and your Devices

Our portable devices have evolved into veritable data vaults as an outcome of our increasingly connected and digital lives. As ...

How-To, Instructionals

Basics of Mac Finder