Who is Responsible for CIPA Compliance?

First, let’s get something straight: CIPA compliance is a prerequisite for receiving E-Rate funding discounts to pay for communications services like internet connections and (for now) Voice Services. If you are not asking for E-Rate, then CIPA does not apply to you. Period. The reason for this is that it is a violation of First […]

Psst… Do You Want to Know a Secret?

Amazon’s Alexa Has Some Answers to Questions You Probably Don’t Even Know to Ask. Alexa is a top-selling gadget for Amazon, and the list of things it can do is ever increasing. Most people who use Amazon Alexa ask the same things over and over -but this virtual assistant can answer a lot of questions […]

Stop Taking Unnecessary Risks!

Follow These 3 Easy Steps To Stay Safe If you’ve ever been a victim of identity theft or have been affected by a cybersecurity data breach, you remember the anger and frustration you felt at a violation you had no control over. Don’t feel defeated – arm yourself with the latest in cybersecurity protection protocols! […]

Want To “WOW” Your Boss With Professional Diagrams And Flowcharts?

I Have Some Tips For You. I often get asked by my boss to take the data she accumulates and put it into easy-to-read diagrams and charts. I was using Excel until just recently, which is great, but I needed something with more functionality and design choices. Then I found Microsoft Visio. I think it’s […]

Why I No Longer Charge My Mobile Phone Overnight and Why You Shouldn’t Either

I just read this warning: “Don’t overcharge your mobile phone. Make sure you unplug it from the charger after it reaches 100%. Don’t leave it charging overnight.” Why is this? It’s because your mobile phone charger doesn’t stop charging after your phone reaches 100% capacity. It keeps topping off the charge during the night. This […]

New Threat Alert From The FBI – Password Spraying

7 Steps To Protect Yourself You probably use a number of personal identification numbers (PINs), passwords, and passphrases to get money from ATMs, to use your debit card when shopping, or to log in to your personal or business email. Hackers represent a real threat to both your personal and business password security and confidential […]

Getting the Most Out of Your Business Website

Today’s internet has literally changed the way businesses function. It has redrawn the boundaries and changed the rules of competition in today’s business climate. The Internet has allowed business owners to create much closer relationships with their customers. In addition, it has given consumers more power through access to unlimited information. Regardless of the size […]