Select a word you want to highlight quickly, without dragging the mouse, by double-clicking on it. Highlight a whole paragraph by triple-clicking on it. (Bet you didn't know that one!) Select a word you want to highlight quickly, without draggin...
Continue reading
 To go straight to desktop just hit WIN+D the WIN button is the one with the wavy Windows flag icon on a Windows PC!
Continue reading
Generally, we like to make the argument that nothing about your small business is too small. We do say it a lot in relation to cybersecurity — no size of business is immune. Yet, there is the chance your IT budget is too small. Consider these indicat...
Continue reading
When you see the letters ZTNA, you may not immediately think cybersecurity, but you should, as those letters stand for zero-trust network access. This article explains what ZTNA is and why it is advisable for securing remote access. Globally, work en...
Continue reading
IT OverhaulHolding on to outdated software and legacy hardware can cause real problems for your business. Plus, you miss out on the advantages that come with having the latest technology available to do your job well. With the rapid pace of change in...
Continue reading
Do you ever try to highlight a long URL from the browser address bar to copy or delete it? Why bother? Instead just hit F6 and the URL will automatically highlight. Nice one!
Continue reading
 Turn off unwanted distractions in Teams by enabling do not disturb mode. Just click your profile icon in Teams to set your status.
Continue reading
 If you want to delete your browsing history quickly? Try hitting CTRL+Shift+DEL to go straight to the browsing data menu
Continue reading
Huntington Volvo? Rowe Subaru? What will your hilarious quiz results be when you enter your fourth-grade teacher's name and first model of car? You may think it's silly entertainment … until it isn't. Many fun social media questionnaires ar...
Continue reading
Hollywood would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by James Bond's tech guru, Q. Yet in real life, most hacks are nothing like that. Cybercriminals often simply fool a human to g...
Continue reading
The risk of a cyberattack is still growing globally, and no business is too small to hack or breach. It's important to plan for business continuity and disaster recovery and to do so in advance so you're prepared for the worst. But first, you'll need...
Continue reading
When you've upgraded to a new computer, the old one is a bit of an albatross. You paid good money for that desktop or laptop, and you want to continue to see a return on investment. Plus, disposing of that technology feels wasteful. It's not as if a ...
Continue reading