Author Archives: ezstaff

35 Keyboard and Computer Shortcuts Everyone Should Know

Keyboard and computer shortcuts are designed to make routine computer functions quicker and easier. The only problem is that many of these have gone unnoticed by the average user. By using simple keyboard and computer shortcuts in the workplace, you can increase your productivity and cut back on the strain caused by repetitive motions.

Tom Ridge: “We’re in a Cyberwar.” Is Your Business on the Front Lines?

              Recently, former Pennsylvania Governor and first US Secretary of Homeland Security, Tom Ridge, spoke during a Lancaster Chamber “Wake Up to the Issues” Forum about the alarming lack of urgency among our nation’s leaders when it comes to cybersecurity. Ridge, who is an established authority on cybersecurity, maintains that we are engaged in an all-out cyberwar, and because politicians are slow to act or take threats seriously, businesses and government agencies themselves are perpetually in danger of devastating attacks.

how to fix common pc problems

How to Fix Common Computer Problems (with Checklist)

It’s a fact: there are a million different things that can go wrong with your computer. And while you can always call IT support, many problems have simple solutions that you can quickly take care of yourself. After all, who wants to sit on the phone describing an issue to support when you could be getting back to work and moving on with the day?

True Tales from IT Support

The world of IT can seem like a scary place. After all, computers often do weird, unexplainable things! Not to mention the hackers, spammers, and scammers who troll the internet looking for their next target. But through it all, it’s nice to know the good guys have our backs, when things go bump in the night (or during the day).

The Security Risks Posed by Social Media

As companies flock to social media for their branding needs and employees continue to spend time on the likes of Facebook, Twitter, and other social sites, there’s a growing concern about the risks associated with using these sites—concerns that could threaten the security of your business.