Tech Tips

2019: Year of Ransomware

This year at the Transform 2019 - GrayMatter’s annual Industrial Intelligence Conference - which took place at Put-In-Bay, Ohio, ransomware was the lead discussion. It is said that over the past decade energy, water and waste water systems, food and agriculture, chemical, commercial facilities and transportation systems are among the top commonly targeted corporations for…
Read more

Microsoft Excel Shortcuts

Here are some shortcuts that you can use to maximize your workflow to maintain an efficient Excel experience. General Program Shortcuts Press: Ctrl+N: To create a new workbookPress: Ctrl+S: To save a workbookPress: F12: To open the Save As dialog boxPress: Shift+F11: To insert a new worksheetPress: Shift+F9: To calculate active worksheets Press: Ctrl+Z: To undo an actionPress: Ctrl+Y: To redo an…
Read more

FaceApp Security Concerns

After going viral, users are being urged to delete FaceApp – the popular app that will take a photo and use several filters to adjust the image. The Russian-made app is posing security concerns due to the terms of service giving them rights to access and use your data! Upon downloading this app, the user…
Read more

CPU War: AMD vs. Intel

Your CPU (Central Processing Unit) is the brain of your computer. If you’re into the PC gaming scene or have shopped for a new desktop or laptop within the last decade, you’re no stranger to the nomenclature; i3, i5, i7 and the most recent – i9. If you’re not sure what these designations mean, check…
Read more

Password Protection

A well-structured password is critical in protecting your security and identity while online. Two-factor authentication is a free feature which can be enabled on some of your most important accounts – banking, social media, etc. This technique adds one extra step to your login process but provides you with powerful protection against cyber crime. If…
Read more

Tips to Improve Your Computer’s Performance

Over time, clutter begins to accumulate your hard drive. The main culprit (if you have mechanical hard drive) is fragmentation. Clearing these types of files can be critical to your system’s performance. Restarting your computer regularly (but not too often!), can resolve performance issues but that alone may not do the trick. Often, there are…
Read more

ZombieLoad – A Microarchitectural Data Sampling Vulnerability

Researchers from Graz University of Technology have recently discovered a flaw in the microarchitecture of Intel’s chipset. ZombieLoad, which exploits a vulnerability in Intel’s hyperthreading technology as an attack vector, allows third party agents to execute code on your machine without your knowledge or consent. While ZombieLoad cannot be remotely executed on your machine (meaning,…
Read more

Virtual Private Networks (VPN) and Their Benefits

Virtual Private Networks, or colloquially “VPNs”, are servers or a network of servers that are owned by a separate company from your ISP (Internet Service Provider) and act as a middleman between you and the connection to your ISP. When you connect to the internet, you send data, or packets, from your computer to the…
Read more

VoIP for your Business

VoIP (Voice over Internet Protocol) is a rapidly expanding service utilized by thousands of businesses worldwide. VoIP is a technology that uses the same lines that your internet data is transferred through as a medium for voice traffic. VoIP empowers businesses to circumvent the overhead of hiring a company or contractor to install entirely new…
Read more

Understanding Intel’s Naming System for Processors

Core i”X” Intel CPUs tells you exactly which model that CPU is with the number directly following the “i”. On top of that, every model is linked directly to a level of performance. Here is a brief explanation of the performance of each model: A Core "i3" chip is on the lower end of performance…
Read more