
IT Security Tip #20: How to keep your team from unintentionally causing a security breach
Quick Tip: Make security a habit, through Security Awareness Training and Testing. Why? With so many access points, from cell phones to laptop and home

Quick Tip: Make security a habit, through Security Awareness Training and Testing. Why? With so many access points, from cell phones to laptop and home

The latest addition to the Office 365 family is Bookings. This online service helps schedule appointments with businesses using software. Good ‘ol pen and paper

Search for new sites that are similar to your favorites by simply typing “related:sitename.com” (e.g., “related:macys.com” will bring up similar shopping sites). [code-snippet name=”hiding-blog-image”]

Do you realize that your Microsoft Word document may contain hidden and personal information that you may not want to share with others? Confidential information

Technology continues to trend toward increased mobility, and business practices are headed along with it. Apple’s iPad has fairly universal appeal as a personal tablet,

I am a familiar face to our IT Radix clients. As a Senior IT Consultant, I’m in the forefront of IT Radix serving our clients

Add an asterisk wildcard to allow the Google search engine to fill in missing words if you don’t know exactly what you are looking for,

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting
Bouncing back from a short hiatus, Firefox returned with a bang by snatching the PCMag Editors’ Choice award for best browser. With a plethora of

To VoIP, or not to VoIP, that is the question that many small- and medium-sized businesses have been asking. And with good reason, since placing
"*" indicates required fields