Technology Advice for Small Businesses

Behavioral biometrics 101

It’s not long since static biometrics, like fingerprint sensors, first became available on mobile phones, allowing us, in theory, to do away with PIN numbers and security passwords. Still, static biometrics are only available on high-end smartphones and use proprietary technology that limits their use. But things are about to change with what could very… Continue reading Behavioral biometrics 101

The productivity-boosting tools you need

Another week buzzes by and half the items on your to-do list are still sitting there untouched. It’s a familiar feeling for many of us, and life – both in and out of the office – only seems to get busier and faster-paced. If you’re struggling to keep on top of your routine tasks, let… Continue reading The productivity-boosting tools you need

Android’s new OS is called Marshmallow

Following in the foodie footsteps of its predecessors comes Google’s latest operating system for Android devices – Android 6.0 M, otherwise known as Marshmallow. It’s the big sister of Lollipop, the operating system currently installed by most Android users. It’s likely to be some time before a release date is confirmed for the new operating… Continue reading Android’s new OS is called Marshmallow

The website conversion rules you need to know

As we all spend more and more time on the Internet, business web presence is becoming increasingly important. And having a website is not enough anymore. If you’re not converting visitors into customers, your competition is likely snatching them up instead. So how can you create a website that converts and leads to greater profits?… Continue reading The website conversion rules you need to know

How IT can add to your business value

It’s almost second nature to think of IT as something that helps businesses achieve value. However, your IT department should be able to explain exactly what they are doing to add value to your business. Of course, if they can’t explain it they might be hurting your company. It doesn’t matter if your IT is… Continue reading How IT can add to your business value

New features added to Outlook

While there are plenty of email services available today, businesses have been turning to Outlook in Office 365 for good reason: it allows users to stay connected with ease and, more importantly, safely and securely. But things just got even better, for Microsoft has rolled out new features for Outlook on the web, aiming to… Continue reading New features added to Outlook

5 tips to free storage space on your iPhone

Running out of storage space on your iPhone? Don’t worry, you’re not the only one. If you have a habit of downloading applications that you like, using them, and forgetting to optimize or delete them afterwards, the storage space on your iPhone can quickly fill up. Thankfully there are plenty of quick and easy ways… Continue reading 5 tips to free storage space on your iPhone

5 reasons not to jailbreak your iPad

For millions of happy users all over the world, the iPad is fantastic just as it is. It’s easy to use, and there are literally over a million apps to choose from and enjoy on the App Store. But there are also people who want to escape Apple’s restrictions. They resort to jailbreaking, a process… Continue reading 5 reasons not to jailbreak your iPad

How to lock your Mac easily for added security

Do you ever worry you may be leaving private information exposed on your Mac when you leave to grab a drink or use the bathroom? What if a nosy employee or thief jumps on your computer and sees or steals your confidential information? It may sound unlikely, but it can happen. So if you’re looking… Continue reading How to lock your Mac easily for added security

Learning from the Ashley Madison hack

The Ashley Madison hack is simply the latest case of a big time company having valuable data stolen. It’s a trend that shows no signs of subsiding, so you would be foolish to not pay attention to it. Want to know what your business should learn about security from this scandal? Here are three important… Continue reading Learning from the Ashley Madison hack