Category: Blog

What Is Spear Phishing?

used with permission from Norton by Symantec, by Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information.

Customizing the Ribbon in Outlook 2013

Did you know you can customize the Ribbon in multiple windows in Outlook? If you want to permanently add or remove options to declutter unused tools or make your workflow

Crash course: Computer memory

used with permission from HP Technology at Work There are dizzying amounts of memory types in modern computer devices, from DDR SDRAM to L3 caches. And for many of us,

7 Quick Windows 10 Tips

If you haven’t tried Windows 10 yet, now is the time to start thinking about it and planning for it (verify your programs will be compatible). For those of you