Imagine IT (i)nsights
Imagine IT Insights
Microsoft’s new productivity apps are live
In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users. Take a minute to learn about what they can do for your team!
Google improves Chrome’s security settings
Most web browsers have built-in security measures to protect users, but some of those aren’t enough to ward off unwanted software. To improve Chrome’s security, Google rolled out some changes in its Chrome Cleanup tool for Windows. Here’s how the enhanced tool protects you.
How to connect accessories on Android
Did you know that you can connect a mouse to your Android tablet, or even an Xbox 360 controller to play a game console-style? The truth is many Android devices support a wide range of accessories. Here’s everything you need to know.
VoIP options: Open source vs. Proprietary
Switching to internet-based phones gives you the chance to enjoy innovative new call features and significant cost reductions. There are a lot of options when choosing which voice over IP (VoIP) platform you use, but first you need to pick whether you’ll use an open-source or proprietary system.
Outlook on Mac and Windows gets redesigned
Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart. If you use Outlook on a desktop, check out these new changes.
Google studies effects of leaked logins
Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.
Windows Hello makes logging in simple
In another example of sci-fi technology becoming reality, Microsoft's biometric logins can now recognize your face, fingerprint, or eyes when you attempt to access your device. It’s exciting as well as convenient and we’ve got everything you need to get started, right here.
Essential macOS High Sierra updates
The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all users.” This is a standard message in most operating system updates, but users seldom pay heed. This time, however, Apple’s latest Mac OS includes a security update that’s essential to keeping your devices safe from KRACK.
Google My Business now accepts appointments
There are countless platforms that showcase, review and link to small businesses, but few have as much impact as Google does. Although business owners can’t choose where their site ranks in the search results, they can edit information that is displayed and insert some flashy new features.
OneDrive’s new feature helps you save space
Don’t you just hate it when your PC gives a warning message that it’s running out of space? You’re then forced to go through all your files to figure out which are important and which ones can be deleted. Sometimes you manage to get a few megabytes back, but oftentimes you end up grabbing your external disks. But with OneDrive Files On-Demand, the...
Key security enhancements in Android 8.0
Oreo is Android’s latest and greatest operating software to date. With sleek new enhancements such as a picture-in-picture functionality, smarter Wi-Fi toggling, customizable application notifications, and more, Android users have plenty to get excited about. However, its key security updates aren’t getting as much attention even though they’re...
What is “serverless” computing?
Thanks to economies of scale, cloud computing resources are cheaper and more stable than those on a local area network, but the cloud is still made up of servers that require expert configuration. Serverless computing is one way to reduce management burdens.
Unified Communications Explained
There was a time when “voice” was the sole business communication solution. Then, we were introduced to emails, texts, and chats, all of which are extremely useful and are here to stay. But wouldn’t it be nice if there was a communication solution that integrated everything -- voice, messaging, video -- into one platform? That’s where unified...
Hackers exploit vulnerable Office feature
As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen.
Mobile devices and HIPAA compliance
Mobile devices have revolutionized the healthcare industry: They’re convenient and significantly improve work efficiency and patients’ satisfaction. Yet they also come with risks. Patient data handled by those devices can be leaked. That’s why every healthcare provider needs to be extra careful about data security when using mobile devices.
Navigate Windows 10 easily with ‘Follow Me’
According to a Microsoft tipster, a proposed new feature in Windows 10 will allow users to navigate the system with the help of its virtual assistant (VA), Cortana. ‘Follow Me’ is an enhancement that will make navigating the operating system much easier, which will be particularly useful to those who find it a bit challenging.
KRACK hacks: What you need to know
You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK.
How does Apple Pay work and is it secure?
Apple Pay is a way for iPhone and iWatch users to make credit card payments using only their mobile device. Although it’s incredibly simple to use, some small businesses are worried about whether accepting these digital payments will add to their data security burdens. However, once you understand how it works, you’ll see just how easy it is to...