Want to get rid of your Mac? Not so fast

Buying a secondhand Mac is a popular way to save money on relatively expensive equipment that retains its value. Conversely, selling your used Mac is a great way to expose yourself to identity theft — unless you follow these steps to keep your personal information safe.

What are BYOD and CYOD?

Bring your own device (BYOD) and choose your own device (CYOD) policies are popular among businesses across industries these days. Both give employees the freedom to choose the devices they’re most comfortable and familiar with, empowering them to be more efficient and productive.

What is multi-factor authentication?

There are some very basic security measures you can use that offer really high levels of protection for your business.

Multi-factor authentication is one of those.

Our new video explains what it is, how it works, and why you really, really want to start using it in your business.

Whiteboard makes collaboration simple

Brainstorming is an important part of any collaboration. And Whiteboard, inside Microsoft 365, is the simple, no-nonsense way for teams to do it.

Whiteboard does exactly what you might think. It’s a tool for sharing ideas with as many people as you like, in real time just by sharing a link.

Protect your privacy in Windows 10

Since its release in 2015, Windows 10 has gotten a bad rap for supposedly gathering too much personal information from its users. Whether you believe Microsoft’s operating system is invasive or you just want to pull out all the stops to keep your personal information safe, here are some Windows 10 settings you can tweak to protect your privacy.

Should your business be cloud based?

Should your business move to the cloud or not?

First, let’s explain what this means.

A ‘cloud based’ solution, simply means that your data is stored safely on remote servers. And you can access it from anywhere on any device.

There are lots of benefits to going 100% cloud based.

Security best practices for BYOD policies

Bring your own device (BYOD) policies give employees the flexibility to use devices they are comfortable with while allowing businesses to reduce hardware spending. However, BYOD also carries plenty of security risks.

Loss or theft of devices – Employees often bring their personal devices wherever they go.