How to wipe your hard drive.
Every year you read about confidential data being recovered from recycled computers. See Confidential data found on old state computers sold as surplus, audit says and Computer hard drive sold on eBay 'had details of top secret U.S. missile defence system'. A recent...
How to Prepare Your iPhone or Android Phone for Sale
Nowadays, smartphones are filled with all sorts of personal data including contacts, schedules, photos, videos, documents, and more. Whether you're selling or giving away your old phone, you'll want to both save this personal data and prevent others from gaining...
5 Ways to Train Security-Conscious Employees
Organizations around the globe are storing more sensitive data than ever. It has become increasingly important for employees handling this data to be aware of modern cyber security best practices and threats. When dealing with large volumes of sensitive data, lack of...
4 Common IT Mistakes That Small Companies Make
A vast majority of small companies rely on the latest technology to run efficiently. For these companies, making smart IT decisions can affect daily operations, as well as long-term success.Here are 4 common IT mistakes that small companies should avoid:1. Failing to...
How IT Automation is Saving Companies Time and Money
Custom automation services provide many small businesses with a competitive edge. Information technology and automation go hand in hand and allow small businesses to compete with bigger, more established firms. Automation helps you cut costs while increasing user...
What You Need To Know About Anthem’s Security Breach
US health insurer Anthem Inc. announced on February 4, 2015, that it was the victim of a sophisticated cyber attack resulting in the theft of tens of millions of records. Hackers were able to break into a database that contained as many as 80 million records. These...
What Small Businesses Can Learn From Sony’s Major Cyber Security Mistakes
Life at Sony Pictures Entertainment Inc. is slowly getting back to normal after becoming the victim of one of the most malicious cyber attacks in history. Sony's employees arrived at the office on November 24, 2014, to find the image of a red skull on all of their...
4 Simple Ways to Boost Your Wi-Fi Signal
Wi-Fi has become a staple for millions of people, but one of the main problems that Wi-Fi users face is weak signal strength. Weak signal strength can seriously hamper your productivity since it results in slow connection speeds and a smaller range of...
How to Set a Default Font in Microsoft Word
It's really no wonder that Microsoft Word is the world's most popular word processor. The application allows users to easily create documents ranging from laundry lists to flyers to academic dissertations. This versatility comes from Microsoft Word's use of templates....
Benefits of Remote Monitoring
The Miller Group, like many IT service providers, uses remote monitoring tools to gather information and send reports about our clients’ computer systems. Almost anything can be monitored, from routers and firewalls to virus detection and email services. Here are six...