Purplo

How To Remove Microsoft Office Metadata?

This article covers the definition of metadata and how to view, manage and delete it in Microsoft applications. What is Metadata? Metadata is information about your data. It contains facts that can’t be disputed, the same way data does. Here is an example from Microsoft Word. Let’s say you’re writing a letter to a co-worker. […]

What Is The Fake DHS Phishing Email Going Around?

How Can You and Your Employees Avoid It? The Cybersecurity and Infrastructure Security Agency (CISA) is warning about an email phishing scam that tricks users into clicking on malicious attachments that look like legitimate Department of Homeland Security (DHS) notifications. The email campaign uses a spoofed email address to appear like a National Cyber Awareness […]

The #1 Security Threat to Local Small Businesses

There are many types of risk in business: the risk that a new competitor will come on the market and steal market share, the risk that top staff members will jump ship for a better offer . . . but are you considering the significant risk that is associated with a cyber attack? A recent […]

How to Make Calls with Amazon Alexa

  Did you know you can use just about any Amazon Echo device to make phone calls for free? You can do the same in the Alexa app on iOS or Android, whether or not you have an Echo device. You can also call others in your contacts on their Echo devices instead of their […]

Which Application Rules Supreme: Outlook or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and subscriptions as well. When the big change happens and it is time to make […]

How to Create a Strong Password You’ll Remember

Nearly every site or service we use online requires a username and password. Remembering hundreds of unique passwords is just about impossible, and reusing passwords across multiple sites can be dangerous. If one account is compromised in a data breach (and this is likely: check out IdentityForce’s list of all the breaches so far this year), any […]

Critical Update From The NSA

The NSA Is Urging To Patch Remote Desktop Services On Legacy Versions of Windows The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats. Recent warnings by Microsoft stressed the importance of installing patches to address a vulnerability […]

How Much Should A Company Invest In Information Technology?

The rapid increase in technology use in businesses has affected every industry. Across all businesses, the need to keep up with the competition means paying attention to what technologies are available and incorporating the right tech tools as they become viable. Whatever your business, you know that you need to invest in information technology to […]

Sign In With Apple

Sign In With Apple…Should You Use It? Apple recently reported that its new “Sign in with Apple” feature will be part of the iOS 13 release in the fall of 2019. It promises to protect your privacy, and authentication experts say it could have an enormous impact on data privacy. What Is Sign In With […]

How to Find Someone’s Email Address

Email is a great system when it works well, but it has some frustrating limitations. You have to know someone’s email address to be able to reach them via email, and there’s no central database for finding email addresses. You can often use the internet to find people’s mailing addresses via directory searches, but not […]