
How to protect yourself from cryptojacking
Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds. If you have a relatively new computer but

Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds. If you have a relatively new computer but

Last month we spent a little time talking about your IT “breakfast” and foundation of your business—Backup. This month we want to keep the ball

Office 365, the cloud-based version of Office, is one of the most popular software suites used by small- to medium-sized businesses (SMBs) today. With an

From the desk of: Cathy Coloff Subject: Let’s do lunch! In preparing for this newsletter series, we asked our team what their favorite meal of

The Android operating system is open source, which makes customization and app development easy. The problem is that cybercriminals can also access Android’s programming code,

Mealtime Technology
In this issue:

Need help getting some work done? Microsoft constantly releases new Office 365 features that can give you an edge over the pile of work on

Risk-taking is par for the course for entrepreneurs. Taking the leap to start a business is just the first in a series of risks an

Apple’s iOS has been through countless updates over the years. It’s hard to keep up with all the new features and settings, so we don’t

On January 14, 2020, the world will bid a fond farewell to the beloved Windows 7 operating system. Well, sort of. Microsoft has declared that,
Have a question about any of our blog posts or another IT topic? We’re always happy to help. Reach out using the form below and a friendly IT Radix team member will be in touch.
"*" indicates required fields
"*" indicates required fields