Purplo

Habits You Want From Your Technology Partner

Habits You Want From Your Technology Partner When you are running a business, you want your technology to integrate well with the other tech you use in your business and with your overall IT platform. When you run into situations where your tech fails to integrate well, it can cause serious problems—leading to lost productivity, […]

Building a Rock Solid Cybersecurity Plan

Cybercriminals may be going into a stealth mode, but that doesn’t mean that cyberattacks are slowing down — quite the opposite, in fact. According to the 2018 SiteLock Website Security Report, attacks increased by 59% and accelerated going into December. Record numbers of businesses are being infiltrated by hostile actors, with data breaches affecting hundreds of millions of users […]

Old School Meetings Revisited

You know running a successful business requires much more than just offering a great product or service. It takes constant engagement and collaboration of all of your employees to produce the best results, and it takes your best effort to remain competitive in a crowded marketplace. Collaboration between employees used to mean lots of daily […]

Important Security News About Mac & Zoom

Did you know that your Macintosh webcam could have been hijacked? A serious security flaw in the Zoom video conferencing application joined Mac users to video calls without their permission. Zoom has now released a fix – click here. A vulnerability in the MacZoom client allowed malicious websites to enable Mac cameras without users’ permissions. […]

How to Password Protect an App on Your Android Device

Have you ever wanted to put access to certain apps on your phone or tablet under an extra layer of security? There are all sorts of reasons people might want this. Maybe you want to share your phone with a child, but you don’t want little Johnny messing with work apps or your grown-up Netflix […]

How to Keep Your Business Safe From the Dark Web

Assassins for hire, drugs by mail order, and fake passports: What do all these things have in common? You can find them all on the dark web. “Okay …” you may be thinking, “Sounds like a blast — but how does this affect me and my business?” Well, most likely, you’re not surfing the dark web for […]

How To Remove Microsoft Office Metadata?

This article covers the definition of metadata and how to view, manage and delete it in Microsoft applications. What is Metadata? Metadata is information about your data. It contains facts that can’t be disputed, the same way data does. Here is an example from Microsoft Word. Let’s say you’re writing a letter to a co-worker. […]

What Is The Fake DHS Phishing Email Going Around?

How Can You and Your Employees Avoid It? The Cybersecurity and Infrastructure Security Agency (CISA) is warning about an email phishing scam that tricks users into clicking on malicious attachments that look like legitimate Department of Homeland Security (DHS) notifications. The email campaign uses a spoofed email address to appear like a National Cyber Awareness […]

How to Make Calls with Amazon Alexa

  Did you know you can use just about any Amazon Echo device to make phone calls for free? You can do the same in the Alexa app on iOS or Android, whether or not you have an Echo device. You can also call others in your contacts on their Echo devices instead of their […]

Which Application Rules Supreme: Outlook or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and subscriptions as well. When the big change happens and it is time to make […]