Installing powerful antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, government agencies, and ISPs constantly monitoring networks and your online habits, hopping onto a Virtual Private Network (VPN) is crucial for keeping your surfing habits private. Here’s why. What is VPN? Simply put, a VPN is […]
Author Archives: Onsite Computing, Inc.
If you’re an experienced Mac user, you’ve probably mastered many of the handiest keyboard shortcuts. But there’s plenty more beyond Control + C (copy), Control + X (cut), and Control + V (paste). Here’s a look at some of the less common Mac keyboard shortcuts that will save you time. Minimizing (or ‘Docking’) the front […]
Security breaches are becoming an all-too-common occurrence in the healthcare industry. Due to a sever lack of competent security measures to protect extremely vital patient records, healthcare organizations have become a prime target for hackers and malicious insiders alike. Read on to find out some surprising statistics as exposed by healthcare data privacy company, Protenus’ […]
Finding a power socket is often the first thing you do when carrying a laptop to work in a cafe, a coworking space, or an airport, and not every time will you be lucky to find one available. You’ll be forced, then, to rely solely on your laptop battery — if it still has any […]
At Microsoft’s 2017 Ignite conference, three new apps were announced that help small businesses streamline everyday tasks. The apps — Connections, Listings, and Invoicing — spent a few months as limited previews, but are now available to anyone with an Office 365 Business Premium subscription. Let’s take a look at what they do and how […]
If the browser you’re using can’t guarantee your safety, you could be one click away from downloading malware into your computer. Although it’s easy to click ‘X’ on suspicious pop-up ads, some threats are more difficult to detect. Google addresses this and other web safety risks by substantially changing Chrome’s security settings. Take a look […]
Wouldn’t life be much easier if you could connect a keyboard or mouse to your Android tablet or smartphone? Believe it or not, you can. What’s more, you can connect an Xbox controller and play games console-style right from your device. USB keyboards, mice, and gamepads Android phones and tablets don’t come with standard, full-size […]
Server virtualization allows you to deliver computing resources to workstations in your network. Those resources are packed into virtual machines (VMs), which can be deployed at a moment’s notice so you can easily add users to your network. However, there are risks associated with trying to manage lots of VMs. The dangers of VM sprawl […]
Voice over IP (VoIP) upgrades are the clear choice for businesses that want to cut telecommunications costs and improve customer service. It’s a versatile technology with incredible customizability, and although we do most of the work for you, it’s important to understand the difference between proprietary and open-source systems. What are “proprietary” systems? When most […]
Microsoft recently announced that it’s revamping Outlook’s user interface and improving certain features. The redesign is aimed at decluttering the desktop version and align it with the much cleaner and more user-friendly iOS version. Mac and Windows users can look forward to a sleeker design, better features, and reduced complexity. How Outlook will be simplified […]










