Google Drive now allows comments on MS files

Google recently launched a new feature on Google Drive that will improve collaboration. Users can now use a combination of Microsoft Office and G Suite while working with their teammates and clients. ...

Safe web browsing requires HTTPS

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit ...

Top business phones according to Google

From Samsung to Huawei to HTC, there are plenty of Android smartphones available to consumers and businesses. But the choices get even more confusing as smartphone manufacturers release new models every year. ...

Virtual desktop or Container: How to choose

Even if you’re aware of virtualized containers, it’s probably difficult to explain how they differ from virtual desktops. Thankfully, all you really need to understand is whether containers are the better option ...

Choosing the best VoIP option for SMBs

You have just decided to use VoIP as your telephony solution, but now your technician is asking how you want to use it. Do you want traditional desk phones (hardphone) or software-based ...

Tricks to make you work smarter in Outlook

Outlook is arguably the best tool that businesses use to manage their email, set up meetings, and coordinate projects. It's much more than a basic email program and includes features that help ...

The difference between Windows 10 versions

When buying new hardware, you have to choose which operating system (OS) to install. And if you go with Windows, you’ll have to make even more decisions, as there're Windows 10 Home, ...

Chrome users panic as new scam spreads

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little ...

Keep your Mac safe from cyberthreats

Mac users follow certain steps to maintain privacy and protect company data. But if you're too busy or short on resources, you might place security lower on your to-do list. Whatever your ...

Hackers hijack PCs to steal cryptocurrency

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious ...