New Smartphones with New (or Older) Shapes

Last week we explored the flagship smartphones that are on the market right now. Today, we wanted to look at some different devices. These devices carry the price tag of a flagship (or cost more), but don’t necessarily have the specs that you would expect from devices priced in that area. They explore new form factors, or in some cases, older form factors. Let’s briefly discuss four innovative new devices.

Tip of the Week: Let Others Use Your Android Device with Guest Mode

While loaning out your mobile device probably isn’t something you’re particularly keen to do right now, this may have been the case even before there were health concerns involved. After all, your phone really is just a little package of your personal data. What you may not have known, however, is that Android has had a feature—Android Guest Mode—that can help protect you since Android 5.0 Lollipop came out in 2014.

Powerful Project Tools in the Cloud

Business workforces are shifting and it’s undeniable that a business’ IT has to shift with it. This can leave users maneuvering through their day using all types of different tools. This can tax an IT administrator. One solution that can be used for several purposes and can help almost any project-fueled business is Microsoft SharePoint. Today, we talk about the positive effect SharePoint can have. 

Microsoft Thwarts Major Hacking Attempt, For Now

With just shy of a month before the 2020 United States Election, there has been quite a bit of concern over the idea that external interests may try to sway the results—and it seems for good reason. Only recently, Microsoft interrupted a massive coordinated hacking plot that could have altered the very infrastructure needed to support a fair election. Let’s examine this plot, and what Microsoft did, in some more detail.

Everything You Need to Know to Protect Your Business from Shadow IT

Shadow IT is a big problem in today’s business, but not a lot of people know about it. As powerful as technology can be if it is left unmonitored, it can run into problems. Shadow IT is unmonitored technology because it is brought onto a network without an IT administrator’s knowledge. Today, we talk a little bit about fighting shadow IT and how to get your staff on board.