About Chris Wanamaker

This author has not yet filled in any details.
So far Chris Wanamaker has created 436 blog entries.

What private browsing can and can’t do

As you surf the web, it’s nearly impossible to keep your internet activity completely private. Certain websites collect personal information for marketing purposes and your browser keeps track of all the websites you visit. That browsing information can also fall into the wrong hands, which is why you should consider using private browsing if you want to keep your online activities to yourself.

What is private browsing?

Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — remembers the URLs of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

With private browsing — also called Incognito Mode in […]

What private browsing can and can’t do2020-07-06T08:00:01-07:00

Here’s how you can wow website visitors

Much like how we’re turned off by professionals who look disheveled, we leave websites that look ugly and messy. Follow our tips to get your website cleaned up nicely and make it ready to convert customers.

Make a statement with professional photographs

Before site visitors read what’s on your website, they assess it by checking out your images. A picture is indeed worth a thousand words, but are those words truly what you want to convey to your audience?

Blurry, outdated, or irrelevant pictures tell your site visitors that you don’t care about their browsing experience. In-house photos are the best option, but stock images shouldn’t cause any problems as long as they are optimized for mobile viewing and relevant to your content.

Help visitors find what they want with search tools

If your set of offerings is not expansive, a simple navigation menu ought to help visitors find what they need. However, the deeper your catalog gets, the more you’ll need additional tools. One way is to affix a search bar in […]

Here’s how you can wow website visitors2020-07-03T08:00:57-07:00

Ensure your privacy in Windows 10

Windows 10 helps users by giving useful suggestions as they type and by displaying ads based on their online searches. But these can feel invasive after a while. To ensure your privacy and keep Microsoft’s watchful eye off your computer activity, follow these tips.

Turn off personalized advertising

Windows 10 assigns each user an advertising ID to personalize their ad experience based on their recent browser history. You can turn off the advertising ID feature by doing the following:

  1. Click Start > Settings > Privacy > General.
  2. Toggle off the option “Let apps use my advertising ID for experiences across apps.” This will reset your advertising ID.
  3. If you don’t want to receive locally relevant content from websites, toggle off the option “Let websites provide locally relevant content by accessing my language list.”

Disable Cortana

Microsoft has ventured into the market of voice-controlled virtual assistants with Cortana. This personal assistant allows users to set reminders, schedule events, and send emails, among other tasks. Every time you use […]

Ensure your privacy in Windows 102020-07-01T08:00:18-07:00

Guidelines on monitoring your employees’ online activities

There are advantages and disadvantages to monitoring your employees’ online behavior. Below is an honest and transparent list of arguments for and against such a practice. However, should you decide to monitor your employees, we have some guidelines for you to follow for a smooth implementation process.

The case for monitoring

Here are several reasons why monitoring your employees’ activities on company devices is a good idea. It can help you:

  • Protect your organization from data theft or harm – because careless or disgruntled employees may leak or steal your data.
  • Ensure you have a harassment-free workplace – because cyberharassment (sexual or otherwise) happens among employees.
  • Ensure members of your staff comply with policies – such as not downloading illegal programs or spending time on websites with illegal or hostile content.
  • Provide evidence in case of a lawsuit – should an employee participate in illegal activities using your business’s computers (heaven forbid!), monitoring their device can provide evidence of their involvement.

Sadly, many business owners who monitor […]

Guidelines on monitoring your employees’ online activities2020-07-01T08:00:06-07:00

How to prevent healthcare data breaches

Cloud-based healthcare systems have vastly improved medical services. Digitization has allowed hospitals and clinics to provide better patient care and greater accessibility to information. However, it has also increased the risk of personal health information (PHI) cybertheft. For this reason, healthcare cybersecurity experts are working harder than ever to protect PHI.

From financial information to medical information

In the past few years, cybercriminals have focused on stealing financial data, including credit card numbers, online banking credentials, and other personal information. But things are taking a turn, with financial institutions fortifying their database security and raising client awareness on the growing problems.

Stronger data protection measures in the financial industry have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes date of birth, medical and physical records, and social security number — information that can’t be easily reset, and is significantly more valuable than credit card data.

Securing healthcare data

Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take […]

How to prevent healthcare data breaches2020-06-26T08:00:29-07:00

How to reduce IT costs with thin and zero clients

If you want to save money on your IT system, one way to do so is by getting low-priced computer hardware. But that doesn’t mean you should settle for cheap but old or low-end models. Instead, consider investing in thin or zero clients.

What are thin and zero clients?

Thin clients are stripped-down computers with minimum processing power and memory. They rely on a basic operating system (OS) and a network connection to access a more powerful system where almost all computing processes take place.

Zero clients work the same way. The only difference is that there’s no local storage or OS installed on the device; all the software, storage, and processing power sits on a server until you need it. This setup makes a zero client ideal for cutting costs.

What are the benefits of using thin and zero clients?

Reduced hardware costs
If you want computers with low upfront costs, choose thin and zero clients. Conventional desktops start at $600 per user, while thin […]

How to reduce IT costs with thin and zero clients2020-06-24T08:00:17-07:00

Advantages of call recording

Customer service representatives are prone to errors; after all, they’re only human. However, if your business is using a Voice over Internet Protocol (VoIP) system, human errors can be minimized by using call recording. Discover how this VoIP feature can enhance your employees’ productivity.

#1. Improve customer service

One of the most important reasons why businesses should always record their calls, no matter its significance, is to ensure high-quality customer service. By reviewing calls, managers can understand how their agents have been dealing with customers, find out whether or not they’ve followed company protocol, and pinpoint any aspects that can be improved on.

Without call recording, managers would have to listen to each call in real time, which is a time-consuming process. By recording each call, not only will your managers save time, but your employees will also be motivated to perform at their best every time they’re on the phone because they know their calls can always be reviewed.

#2. Upgrade employee performance

According […]

Advantages of call recording2020-06-22T08:00:21-07:00

Microsoft 365 signals a new era of productivity for SMBs

In April 2020, Microsoft launched Microsoft 365, the successor to its popular Office 365. But it’s not a mere name change. The tech giant is also introducing improvements to its productivity software that will enhance how your business deals with cyberthreats every day.

Name change

Microsoft has time and again shown that they are willing to make drastic changes to their products and services in the name of development. Their Windows 10 operating system (OS), for instance, is a far cry from its predecessor Windows 8. Microsoft made the jump from what they thought would be a revolutionary tile-based design in Windows 8 to a classic, ergonomically designed Windows 10.

The tech giant has once again made drastic changes, this time to their award-winning line of productivity apps Microsoft Office 365. O365, as it was lovingly referred to for nearly a decade, is now the sleeker, more powerful, Microsoft 365 Business.

Microsoft 365 Business is available to small- to mid-sized businesses (SMBs) on three different subscription plans: Business Basic, Business Standard, and […]

Microsoft 365 signals a new era of productivity for SMBs2020-06-19T08:00:27-07:00

What HTTPS means for cybersecurity

As people’s reliance on the internet deepened through the years, cybercriminals also began to move more stealthily. Online shoppers, for instance, can be led to a payment page that has no HTTPS in its URL. If they enter their personal details on this page, they will be a prime target for identity theft without them knowing. Here’s why you should make sure that the websites you visit have a little padlock icon before their URL, and an “S” after the “HTTP” prefix.

HTTPS encryption

The “s” in HTTPS stands for “secured”. It was introduced in 1995, so older websites that have been left on its own without regular maintenance usually don’t have it. But even to this day, unsecure websites exist, and fraudsters can easily take advantage of them.

When you visit a site with an HTTP connection, everything you type or click on that website is sent without encryption. This means that anyone who intercepts the data transferred between the website and […]

What HTTPS means for cybersecurity2020-06-17T08:00:27-07:00

Ways MSPs are empowering businesses amid a global crisis

To make it through the heightened economic uncertainty brought about by the COVID-19 pandemic, businesses are protecting their cash flows and focusing on their core competencies. Managed IT services providers (MSPs) are lending a hand, too — by empowering remote teams and helping small businesses leverage technology to keep operating despite the myriad challenges. Here’s exactly what MSPs are doing.

Providing infrastructure and service desk capabilities

In today’s digital work landscape, MSPs are keeping their noses to the grindstone to fulfill customer demands and help keep businesses running. While many small companies have taken the first step of transitioning to remote work, they still need help managing the logistics.

Right now, MSPs are providing customers with IT infrastructures and taking on a host of network tasks, including configuring hardware, establishing remote connections, and managing backup and storage options, among other activities. These all help to ensure that company networks are reliable enough to facilitate a remote workforce.

MSPs are also offering service desk capabilities, […]

Ways MSPs are empowering businesses amid a global crisis2020-06-15T08:00:38-07:00