top of page



Handy Checklist for Handling Technology Safely During a Home or Office Move
Moving homes or offices? Don't forget about your technology! Stay organized and ensure a smooth transition with our handy checklist for...
Aug 12, 20234 min read


Do You Still Believe in These Common Tech Myths?
Tech enthusiasts, it's time to bust some myths and separate fact from fiction. Discover the truth behind common tech misconceptions and...
Aug 8, 20234 min read


Want to be Wealthy? Be Healthy! Your Bits & Bytes Guide to Personal and Family Wellness!
Hello, health heroes and wellness warriors! Welcome to the Computer Corner Bits & Bytes Blog, where we're all about keeping you and your...
Aug 7, 20231 min read


7 Advantages of Adopting a Defense-in-Depth Cybersecurity Strategy
Want to level up your cybersecurity game? Explore the benefits of adopting a Defense-in-Depth strategy and gain comprehensive protection...
Aug 2, 20234 min read


Chalk It Up To Greatness: A Salute to Teachers with a Deal You Can't Erase!
It's that time of the year again when we roll out the red carpet on the real MVPs of our lives - our teachers! Yes, you guessed it right,...
Aug 2, 20231 min read


Get Your Geek On! Cruising Down the Bits & Bytes Blog Information Superhighway of Technology!
Welcome to the latest Computer Corner Bits & Bytes blog post, where we're about to take a detour from the serious highway of business...
Aug 1, 20231 min read


Computer Corner Wants To Help You Learn How Microsoft 365 Copilot Is Going to Transform M365 Apps
How would you like to have PowerPoint to look at a Word Document and create a presentation in seconds, including stock photos? This...
Jul 29, 20234 min read


Is Your Online Shopping App Invading Your Privacy?
Are the shopping apps on your phone copying your contacts, stealing your copy/paste activity, or tracking your device through GPS?...
Jul 26, 20234 min read


How to Use Threat Modeling to Reduce Your Cybersecurity Risk
With any cybersecurity strategy, it’s important to get to the heart of the problem. That’s why threat modeling is so vital to proper...
Jul 21, 20234 min read


Announcing our updated Computer Corner website, with help from AI
I had to share what AI created to announce our updated Computer Corner website!!! I promise you, I did not make this up, and I enjoyed...
Jul 20, 20231 min read


Business Email Compromise Jumped 81% Last Year! Learn How to Fight It
Business email compromise (BEC) skyrocketed by 81% last year. Is your business properly protected from this type of nefarious attack?...
Jul 18, 20233 min read


9 NSA Best Practices for Securing Your Home Network
Home networks connect to a lot of sensitive data, both personal and work-related. Don’t leave yours open to a breach. Get 9 best...
Jul 14, 20234 min read


Got Books?
Calling all bookworms! Help us turn the page for local students by donating to our book drive. Your old books could be their new...
Jul 12, 20231 min read


10 Tips to Help Small Businesses Get Ready for the Unexpected
60% of small businesses fail within 6 months of falling victim to a cyber-attack. Don’t leave yourself at risk. Find out how to get ready...
Jul 11, 20234 min read


What Is Push-Bombing & How Can You Prevent It?
Between 2019 and 2021, account takeover (ATO) rose by 307%. Push-bombing is a contributing factor. Find out how you can avoid falling for...
Jun 28, 20234 min read


Is It Time to Ditch the Passwords for More Secure Passkeys?
Passkeys are quickly becoming a popular way to manage account access. Learn what they are and how they compare to passwords. Passwords...
Jun 20, 20234 min read


How to Create Insightful Dashboards in Microsoft Power BI
Do you wish you could create more powerful reports? Get several tips for working with Microsoft Power BI to tell the story of your data...
Jun 16, 20234 min read


Best Ways to Use ChatGPT at Your Business (Without Things Getting Out of Hand)
Have you been wondering how your company can use ChatGPT responsibly & productively? We’ll give you several tips on how to manage this...
Jun 12, 20233 min read


7 Smart Ways to Secure Your Wireless Printer & Keep Your Home Network Safe
Cybernews hijacked nearly 28,000 unsecured printers globally. It made the printers print a guide on security to prove a point. How secure...
Jun 6, 20234 min read


6 Immediate Steps You Should Take If Your Netflix Account is Hacked
Hackers get around $12 for a stolen Netflix account. Find out what you need to do if you think your account has been breached. Netflix is...
Jun 2, 20234 min read
bottom of page