Introduction to VPN
In today's world, where the internet is the backbone of most communication and information exchange, maintaining online privacy and security has become a major concern. Online privacy breaches can lead...
Streamer Interview Series #1
This is our first streamer interview of our tech blog, by none other than, one of our favorite streamers GeekyGlam, and we hope you enjoy! Who is your favorite video...
Information Technology Strategic Planning
IT Strategic Planning is a process that helps organizations align their technology strategies with their business goals. With the rapid pace of technological advancements, for example it is essential for...
What is Antivirus?
Antivirus software is a type of program that is designed to prevent, detect, and remove malicious software. This is also known as malware, from a computer or network. Malware is...
Computers being exploited again!
Large companies are being targeted, most likely for ease of breach vs size of company. In a post, the hacker collective claimed the Radisson Hotels Americas Cyber Attack, stating that...
Cyber Security and Social Engineering
Cyber security isn’t always about some guy behind a keyboard “hacking” into your computer. Some of what a hacker is looking for is an easy target that can be manipulated....
Touch screen vs Non Touch
How is a Touchscreen Different from a Normal Screen?As technology continues to evolve, touchscreens have become a common feature in many electronic devices, including smartphones, tablets, laptops, and even some...
Google an AI – a Superpower?!
Have you heard about Google using AI:"Google’s latest update to its privacy policy will make it so that the company has free range to scrape the web for any content...
Project Tribute Foundation
We support Project Tribute Foundation , but you might have not heard of them yet? I know this isn't a normal tech tip but we wanted to talk about a...
Types of Computer Scams
Employment ScamsScammers pose as a potential employer for an exclusively online or remote job. They will ask you to purchase computers and office equipment with the promise of reimbursement or...
Cybercrime Continued:
Following a two- time disquisition, The Guardian this week published a harrowing exposé on Facebook and Instagram's use as hunting grounds for child predators, numerous of whom business in children...
Cybercrime strikes a school
What happens when a academy system is targeted by a ransomware group? The school refuses to pay, and therefore gets their stolen data ditched noncommercial onto the dark web? Well,...