Latest Articles

The one site about Ransomware you need to check out

By at 5 August, 2016, 1:05 pm

thief_coming_from_monitor_400_clr_10122Ransomware. It's what keeps me awake at night as a CIO and technologist. Also known as crpytoware, these malicious tools encrypt your data, delete or disable the ability to use built-in tools in your operating system to roll back to prior versions and then charge you money to provide you with a decryption key. And they just keep getting more and more sophisticated, with some even providing so called "help desks" to assist you in paying the ransom and decrypting your files. Some variants have been broken and you can find decryption keys on the internet; however, these are the exception. Most have not been broken and short of restoring from a backup, there is no decrypting the files short of paying the ransom and hoping that you get a decryption key and it works. EVERYONE. Yes, I mean everyone! that deals with computers needs to have a basic understanding of ransomware. Kaspersky and Intel Security have partnered to create the website.  


No Comments

Disable Get Windows 10 Icon and Prevent Your System from Automatically Upgrading to Windows 10 With GWX Control Panel

By at 14 March, 2016, 1:50 pm

Windows 10 Icon No

Microsoft, I like Windows 10 but the way you are trying to force it on every Windows user leaves me cold. For those of you that are not aware of what is happening, Microsoft has taken a number of steps to, in my opinion, trick users into upgrading to Windows 10. These actions vary from installing Windows 10 upgrades files on a computer without a user's knowledge, force installing a popup that tells users they can upgrade to Windows 10 now or later but no option to not upgrade at all (the trick is to use the "x" close icon in the top right of the popup window when this happens) or that installs a Get Windows 10 icon that sits in your system tray.  Luckily there is an answer  – a handy utility called GWX Control Panel. 


No Comments

Locky Ransomware Infection is hitting end users!

By at 19 February, 2016, 4:05 pm

Spyware concept

There is a nasty new ransomware infection called Locky that is running rampant currently. This malicious infection is being transmitted by Word documents attached to an email purporting to be an invoice. Check out the following articles and share them with your laweyrs and staff to advise them as to how this is being targeted and to avoid opening one of these emails. The articles include samples of the message and other important information.



No Comments

Tired of writing and reading crappy memos?

By at 17 February, 2016, 12:54 pm

robot-writing-notes_MemoMemos are a necessary evil in the business and legal world, but that doesn't mean that you have to write (or endure) crappy ones. Here's a great article from Kopywrting Kourse on How to write an effective memo. Keep them short, sweet and to the point. Check it out and share it with your co-workers.

No Comments

Start automating your Documents with tools you already have.

By at 9 October, 2015, 3:25 pm

One of the easiest ways to start automating document creation is to use the tools already included in the programs or platform we use daily. For most of us, this will be using text expansion or text replacement[1]. With text expansion or replacement, you type a special word, series of letters or characters and it is replaced with something else, such as a name, phone number, phrase or even an image.  While there are third party text expansion programs, you can easily get started using the auto correction feature built into your program such as Word, Outlook or WordPerfect or included in your operating system such as iOS and OS X.


1 Comment