fbpx

What NOT to do after a data breach

used with permission from HP Tech@Work Breathe deep, reduce anxiety, and avoid these 9 things It’s an IT department’s worst nightmare: Your business has been hacked by a third party that has accessed your sensitive, confidential data. And often, by the time you...

Spam Spam Go Away

used with permission from Norton by Symantec Spam. In some ways, it’s the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it’s also a pervasive problem that’s clogging and overwhelming...

Looping a Show in PowerPoint

Sometimes you want to run a PowerPoint presentation on repeat – looping a slideshow so it can play in the background during an event, perhaps at a trade show booth. Is it possible to automatically loop a slideshow in PowerPoint? Yes! In PowerPoint, it’s easy. Open...

Do we need to pass on passwords?

used with permission from HP Tech@Work You be the judge Nearly 15 years ago, Microsoft Co-Founder Bill Gates predicted the demise of passwords. They were too unreliable, he said, noting there were other more secure ways of granting access to computers. Gates...