In this important Webinar session we focused on the end-to-end process and use of features that help you schedule and host the virtual meeting and tools that help you engage the attendees, manage and record the meeting, and socialize the meeting outcomes.
Here’s a reminder to do something you probably haven’t done in a while…change your common passwords.
And, while you’re at it, choose new passwords that are not so common.
Some of the most commonly-used passwords, according to the security group SplashData, are “password”, “qwerty”, “12345” and “welcome”. Predictably, they
When you buy a new PC with Windows, you know there’s a bunch of software already on it. So-called Bloatware lurks in your new PC – how to find and destroy.
It’s common knowledge that cyber criminals work quickly; they pay close attention yo the IT world and hunt for vulnerabilities to prey on, or new software to use as a disguise for their attacks.
With the release of Microsoft’s Windows 10, malware developers and other scam artists were quick to