by Susan Mangina | May 4, 2022 | Computer Maintenance, E-mail, Mobile Computing, Phones and Mobile, Productivity
A few times a year, I get an urge to purge. Whether it’s spring cleaning or taking a moment to archive last year’s emails, I find it incredibly gratifying to dump (or sometimes simply put away) stuff I don’t need. There’s a whole lot of hippie...
by Susan Mangina | Apr 5, 2022 | iPhone, Mobile Computing, Phones and Mobile
Even if you’re a seasoned iPhone user, there’s a good chance you’re not familiar with the full array of iPhone tricks and hidden features. And with good reason, Apple has been steadily rolling out new iPhone hardware and software updates for nearly 15 years straight...
by Susan Mangina | Apr 5, 2022 | Mobile Computing, Phones and Mobile, Productivity
If you’re reading a story on your phone and you want to read it later on your computer, or you need to see content you’ve been viewing on your phone on your computer’s bigger screen, there’s a simple way to send links directly between your phone and computer browsers....
by Susan Mangina | Mar 2, 2022 | iOS 15, iPhone, Mobile Computing, Phones and Mobile
iOS 15 introduces big changes to the iPhone experience, but not all are immediately noticeable. Here are the best iOS 15 tips and tricks you should try first. 1. Set up Focus Modes Focus is a great tool in iOS 15 that enables you to set up several profiles for...
by Susan Mangina | Mar 1, 2022 | Computer Maintenance, Mobile Computing, Productivity
Even the longest-lasting laptop batteries will die eventually. Here’s everything you need to know to maximize the amount of time between visits to the power outlet. The truth is that the battery in your PC or Mac laptop won’t last as long as the...
by Susan Mangina | Feb 18, 2022 | Dark Web Monitoring, E-mail, Educational Resources, Mobile Computing, Passwords, Phishing & Awareness Training, Privacy, Security
Through our Dark Web Credential Monitoring and Scanning portal, we have recently seen a marked increase in leaked personally identifiable information (PII). Once a cyber-criminal obtains your PII, they can open credit cards, bank accounts, and put your finances at...