Cryptojacking: How to protect yourself

Over time, your computer will work slower as software requirements become more demanding. But if you have a relatively new computer, and are experiencing performance problems after clicking a link or visiting a website, you might be the victim of a new cyberattack scheme known as cryptojacking.

Cortana Improves Business Productivity

With so many affordable IT tools on the market, it's a great time to be a small-business owner. Most of them are basic and won’t require much training, too, so you don’t have to be tech-savvy to use them effectively. All you have to do is find the right one for your particular goals and needs.

Use Single Sign-On to Tackle Account Sprawl

No matter how valuable your cloud subscriptions are, each new set of login credentials users are forced to create and memorize adds another level of inefficiency. With something called Single Sign-On (SSO), you can create one user profile that logs you into all your online accounts.

Office 365 enhancements for iOS and Mac

Good news for Office 365 subscribers who use Apple devices: Microsoft apps now seamlessly integrate with the Apple ecosystem, which means working on documents is now much easier on an iPhone, iPad, and Mac. Here are some of those key capabilities.
Co-authoring in Word, Excel, PowerPoint
Apple users can now co-edit documents in Word, Excel, PowerPoint, and Outlook.

How Facebook’s News Feed tweaks affect you

Facebook’s newest action can mean bad news to businesses. The company had announced its decision to screen its News Feed to include less content from publishers and businesses and more from your loved ones. This comes after the allegations of how social media has unconsciously shaped people’s opinion and mental well-being.

Distributed spam hides illegal activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails.

How to enjoy a better laptop experience

Did you just get the newest MacBook Pro? Or the Lenovo Yoga 920? Either would be very exciting, but before you start showing off your new purchase, there are five steps you should take to make your laptop experience even more enjoyable and long-lasting.

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against future ransomware.

4 new features for Bing Search

Although the internet is a seemingly endless source of information, you may find that unless you ask the right questions, you won’t get the right answers. As a way to accommodate a greater variety of user queries, Bing has recently been updated with four new features.

Bit by Bit Flies High in Setting Up IT for First PA Marijuana Dispensary

At Bit by Bit, we like to break ground.

When Keystone Canna Remedies became the first marijuana dispensary in the state of Pennsylvania, we were right there with them, setting up their IT infrastructure, from-start to finish.

Medical marijuana dispensaries need reliable, secure, scalable IT services, just like any other small business looking to build their brand, serve customers, and sell products.