Author Archives: Onsite Computing, Inc.

Reasons to back up your mobile devices

It makes a lot of sense for electronics firms to pack a variety of functions into mobile devices and expand their usefulness. Instead of confining their use to communications, companies such as Apple, Samsung, and others have turned mobile phones into mini-computers that can serve as a substitute for your laptop, or as a storage […]

Manage your WordPress with this checklist

WordPress is one of the most powerful blogging and content management systems (CMS) to date. Since it powers approximately 27% of all websites, there’s no room for sluggish load times, potential security vulnerabilities, or search engine delistings. To avoid these problems altogether, sticking to the following checklists might help. Make backups It’s crucial that you […]

Outdated firmware is worse than you realize

As workplace IT gets more and more hi-tech, the average user gets further from the building blocks that keep it running. At times that seems like a good thing, but if you aren’t aware of the most basic aspects of your hardware, you could be vulnerable to a nasty cyber attack. Make sure you’re secure […]

5 G Suite updates and improvements in 2017

Google’s cloud platform G Suite has been getting a lot of attention from businesses recently. It’s an incredibly powerful tool that enhances collaboration, boosts productivity, and cuts IT costs. And just when you thought it couldn’t any better, Google releases monthly updates for their cloud software. To save you the trouble of looking through pages […]

3 Ways to move contacts to a new Android phone

Migrating information from an old Android phone to a new one may be one of the least exciting tasks of buying a new gadget, but it’s usually the most crucial as well. Fortunately, Google has made it incredibly simple to move information from one phone to another. There are three possible approaches, and we’ve covered […]

Play with a live virtualized desktop today!

Whether or not you understand virtualization, there’s a good chance you’ve never had a hands-on experience with a virtualized desktop. As one of the most basic applications of virtualization technology, network-based desktops are the perfect example of how businesses can benefit from any form of virtualization. Read on to test out an example desktop! What […]

Be careful of ransomware-infested Skype ads

Since Skype is a free service for consumers, it generally has to rely on advertising to turn a profit. As a result, most users regularly see banner ads on the video calling interface. Recently, hackers have begun to exploit these advertisements by distributing fake ads that contain ransomware. If you’re an avid Skype user, here’s […]

Docs.com shares users’ sensitive files

Have you recently created and uploaded a Microsoft file on Microsoft’s free document-sharing platform, docs.com? Did you know that other than yourself and the small group of people you wish to share documents with, your uploaded documents can be publicly viewed and searched via Google or Bing? Regardless of your reasons for using docs.com, your […]

SMBs and social media policy reviews

We live in an age overflowing with information, and most of this is taking place in social media feeds and timelines. Social media is truly a window to the entire world, but it can be detrimental to your business if your employees are just messing about with hashtags, tweets, and likes all day. Annual social […]

Wikileaks’ charges of government spying

Staving off malicious cyber attackers is already a herculean task, so the last thing you need is to feel exposed from a totally new angle. That’s how many felt after Wikileaks’ accusations that the US government was spying on its citizens. However, the truth is a lot different from what the headlines would have you […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.