Data Transfer

A New Year’s Data Resolution To Stick To

Michael Grippi Uncategorized 0 Comments

Many of us set goals, tasks, and challenges to tackle in the new year. Cleaning out the spare room, shopping around for the best energy deals, or exercising more than we did last year. We set these goals to improve our lives and build on productivity, health, and organization in the future. Resolutions to improve for the coming year are …

New years Computer resolutions

5 New Year’s Resolutions for Your Computer

Michael Grippi Uncategorized 0 Comments

Running the Best Security Software Most computers today run at least some form of basic antivirus. In the modern day however, threats have evolved to be more sophisticated, more damaging, and much more common. Ransomware, malware, phishing, and zero-day attacks all work to attack un-patched systems without strong security. Today, to keep up with increasing threats, you need a complete …

Marriott Breach

Marriott Hotels Exposed 500 Million Customer Records. Make Sure Your Business Doesn’t Suffer the Same Fate.

Michael Grippi Uncategorized 0 Comments

Up to 500 million travelers could be compromised as hotel chain Marriott International have announced a security breach in their guest database. Analysts recently alerted the firm to a vulnerability that has granted hackers access to the hotel chain’s systems since 2014. The firm announced their Starwood Preferred Guest (SPG) loyalty program was compromised for an extended period which left …

Connected devices

Setup for the Holidays

Michael Grippi Uncategorized 0 Comments

The holiday season is here again. TV advertisers have released their festive jingles and stores have dusted off their Christmas displays. Most importantly, shopping centers have moved their latest and greatest devices to the front of the store. It’s almost time to eat warming treats in front of a roaring fire. There may still be work to do, however, before …

Christmas Tech

Buying Technology in Time for Christmas

Michael Grippi Uncategorized 0 Comments

Christmas time is back with us again. The latest devices and gadgets are hitting store shelves just in time to keep up with the rush. Magazines, television, and the web are brimming with advertisements and reviews of the latest tech your money can buy. Before you rush out to buy the gadgets you’ve been waiting all year for, consider a …

Virus infection

More Than A Virus, Common Malware to Watch Out For

Michael Grippi Uncategorized 0 Comments

The term “virus” is often used to describe many different types of infection a computer might have. Virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common are they are typically designed to cause damage, steal data, or spread across the network. Malware describes software designed to act maliciously …

Overheating laptop

Is Your Laptop Running Hot and Loud?

Michael Grippi Uncategorized 0 Comments

Laptop computers commonly heat up a little in normal operation. Electronic components, including large capacity batteries, become warm in use. Your laptop should never become too hot to handle though. When a laptop turns hot to the touch or starts to sound like a jet engine, it’s likely beginning to overheat. Modern laptops use nearly silent fans to cool components …

Registry Cleaner

Are Registry Cleaners a Good Idea?

Michael Grippi Uncategorized 0 Comments

You have likely been alerted by popups while browsing the web. These, often flashing, advertisements claim your computer has more than a thousand errors requiring urgent attention to fix. Perhaps helpfully, these popups offer a solution to cure your computer with a click of the mouse. Buttons marked “fix now” appear to offer a simple fix to all your computer …

Did you get hacked?

How to Tell if You’ve Gotten Hacked

Michael Grippi Uncategorized 0 Comments

Being hacked is the single biggest fear of most computer users. Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control. But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs? What does being hacked really look like? There …