As Phishing Attempts Rise, Remember Email Best Practices

As Phishing Attempts Rise, Remember Email Best Practices

Although email phishing scams have been around since the inception of the internet, today’s scams are not only prevalent but also sophisticated. One of the top reasons why these scams have become common is because they are largely successful. In fact, according to the...
How To Use Social Media For Growing Traffic And Sales

How To Use Social Media For Growing Traffic And Sales

Nobody can deny the importance of social media in today’s society. According to a recent report by Stastista on social media, Canadians spend at last three times more time on social media than reading their emails. At least 27% of online time is spent on social...
Yep, Google Maps Really is Charging Everyone

Yep, Google Maps Really is Charging Everyone

Google has recently announced a major new update to the Google Maps API’s that will come in effect on June 11, 2018. If you’re using Google Maps on your website or mobile apps it is essential that you are aware and take action to continue using Google maps on your...
5 Reasons Why Business Cards Still Matter

5 Reasons Why Business Cards Still Matter

Why use business cards? Do they still matter? These are some of the common questions being asked by entrepreneurs who either want to start or expand their businesses. Although some people will say that business cards don’t matter since you can easily share your...
Technical alert for WordPress users

Technical alert for WordPress users

Last week, the WordPress project issued an update that had a flaw in it. It was caught almost immediately and within a few hours a patch was released. As WordPress states in their blog, the 4.9.3 release of WordPress “will cause sites that support automatic background...
Spectre and Meltdown

Spectre and Meltdown

What are Spectre and Meltdown? Spectre and Meltdown are CPU exploits that can be used to monitor and intercept private information from a computer’s operating system. This is considered a hardware vulnerability and is thus more difficult to mitigate by software...