How to turn off the built-in password manager in Chrome
We always recommend you use an external password manager. And if you do, disable the built-in one offered within Chrome. Here’s why – and how to do it.
We always recommend you use an external password manager. And if you do, disable the built-in one offered within Chrome. Here’s why – and how to do it.
We’re the local data security experts. And one of the things our team prides itself on, is quickly finding ways that hackers could damage your business. In fact, if you give us just 60 minutes, we’re confident we’d find something wrong with your IT setup that places your data security at risk. Watch our new …
EXCEL: Always see the headings when scrolling Excel is great for looking at lots of data, but when you can’t see the column or row headers, you must scroll back and forth to check what the data means. Did you know there’s a great time saver which can lock the headers in place? Here’s how …
POWERPOINT: Add sound to your slides If you want to create a PowerPoint presentation that will impress, consider adding sound. Music, sound effects and audio files can make your presentation stand out. It’s a lot simpler than you think. POWERPOINT: Change your pointer to grab attention When you’re presenting in PowerPoint, how do you focus …
TEAMS: Blur or change your background on a video call Got a video call but your room isn’t appropriate for work? Did you know you can blur your background or change it entirely in Teams? Here’s how to make your backdrop look professional, without having to do any tidying. TEAMS: Look like you are in …
WORD: Concentrate and type more Sometimes when you’re writing an important Word document, it’s too easy to be distracted by all the menus and buttons. Did you know you can remove the clutter from Word and put it into Focus mode… with just one click? Here’s how. WORD: Do whatever you want with one click If …
There are some very basic security measures you can use that offer really high levels of protection for your business. Multi-factor authentication is one of those. Our new video explains what it is, how it works, and why you really, really want to start using it in your business.
We’ve all done it – tapped a link, realized it’s not what we thought it was, and then wondered what damage it might cause to our phone. First of all, don’t panic. But then, take action. There are two things you need to be aware of now. And our new video tells you what they …
Mobile Device Security: So You’ve Tapped A Bad Link On Your Phone Read More »
Did you know we’re right in the middle of a global chip shortage? Many different things have come together to create the perfect storm. And it’s restricting some technology supplies. Our new video explains why you should order early, if you need any new hardware in the next 6 months.
Technology Requirements SYSTEM REQUIREMENTS Desktop Computers Specification Minimum Recommended Processor Intel Core i5 (sixth generation or newer) or equivalent Intel Core i7 (tenth generation or newer) or equivalent Operating System Windows® 10 Windows® 10 Ram 8 GB 16 GB or higher Storage 128 GB internal Solid State Drive (SSD) 256 GB internal Solid State Drive …