Blogs

The latest in thought leadership from our experts

Recent Posts:

MacWindows

What To Do If You’re a Mac User Needing Windows Software

Although users are still passionate in the Mac vs. PC debate, today’s popular apps exist on…
AppiosMac

Which Should You Use: a Mac, iPad or iPhone, or Web App?

Apps frequently exist in multiple versions: a native Mac app, an iPad or iPhone app, and…
hackerspasswordsscams

Beware Unsolicited Facebook Password Reset Messages

If you receive an unexpected password reset email message from Facebook, there is no need to…
Apple Watch

Make Apple Watch Apps Easier to Find with List View

With the original version of the Apple Watch, Apple introduced “grid” view. In this display, tiny…
back upiPhoneMac

Make Sure to Back Up iPhone Photos on Your Mac

New reports of iPhone theft victims being locked out of their iCloud accounts should encourage iPhone…
juice jacking

Juice Jacking Returns to the News But Still Hasn’t Happened

A recent FBI warning about “juice jacking” has drawn lots of media attention—but there is no…
file sharinghybrid workvideo conferencework from home

Helping a PR company thrive in hybrid work environment

Lauren Izaks, COO of All Points PR, was a recent guest on the TECHtalk podcast where…
iPhonewater damage

What To Do If Your iPhone Takes a Plunge

Apple has designed the iPhone with significant levels of splash and water resistance, so briefly exposing…
cloud storageMac

Integrate Your Cloud Storage Service into the Finder

Cloud storage services—such as Box, Dropbox, Google Drive, and Microsoft OneDrive—are an attractive option when desiring…
Mac replacement

How Often Should Macs Be Replaced?

Many Mac users, whether individuals or organizations, wrestle with the question of when to replace their…
Googleweb and app activity

What is Google Web & App Activity, and Should You Leave It Enabled?

Table of content What Is Web & App Activity in Google? How Google Utilizes Web and…
phishingscams

A Practical Guide to Identifying Phishing Emails

Becoming ever more common, phishing attacks are emails that try to lure you into revealing login…
WiFi Network

Is Your Wi-Fi Network a Security Risk?

Connecting devices to your Wi-Fi network is a simple task—but likewise, hackers do not have difficulty…
document scanningiPadiPhone

The Amazingly Convenient Way to Scan Documents Using Your iPhone or iPad

While few individuals have a hardware scanner, many people have iPhones or iPads—and these devices have…

Sending Emails from FileMaker using Outlook on a Mac

Recently we moved from apple Mail to OutlookMail in the office and found that mail would…

Is Your IT Team Stretched Too Thin?

Let them focus on core business functions, and let us take care of the technicalities!

This will close in 0 seconds