Computer St. Louis Blog/News
The new features in Windows 10 Redstone 5
Hot on the heels of the Windows 10 April 2018 Update, also known as Redstone 4, is the highly anticipated release of Redstone 5. While no official launch date has been announced, word is that it will drop around the final quarter of 2018. What can we expect from this latest major update? 1. Windows […]
Router malware worse than experts realize
In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter recap A team of security […]
What’s new at the 2018 Apple WWDC?
San Jose, California, recently hosted WWDC 2018. Apple’s engineers interacted with the developers in attendance, while everyone at the event got a sneak preview at the computer manufacturer’s upcoming products and software. Check out the highlights from the event right here! A more personal, faster iOS 12 Apple has focused on improving the operating system’s […]
Chrome to mark HTTP as ‘not secure’
Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as "not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the...
The dangers of app overload in businesses
Businesses today rely on countless apps and software for day-to-day operations. However, too many of these programs can do more harm than good. App overload brings confusion among employees, and a recent study shows that this costs more than companies realize. How app confusion occurs A new study conducted by CITE Research shows that a […]
Why fewer teenagers choose Facebook
Facebook’s 13-to-17-year-old users are declining despite the overall growth of the social media giant’s subscribers. A new survey by Pew Research Center found that only 51% of US teens are using Facebook, compared with Snapchat (69%), Instagram (72%), and YouTube (85%). Reasons for user demographic shift The same survey found that only 10% of US […]
Virtualization isn’t as complex as you think
Explaining the concept of virtualization is no easy task, and failed attempts to do so have left it with an undeserved reputation. We want to set the record straight about this technology’s many benefits by dispelling the four most common misconceptions. Myth #1 – Virtualization is too expensive for SMBs Many people assume that the […]
Why VoIP is best with remote workers
More and more Americans are working out of the office than ever before. A Gallup poll revealed that since 1996, the number of remote workers increased fourfold, with 37 percent of Americans working from their homes, coffee shops, or coworking spaces. Remote working is changing the set-up of the workplace, and it’s easy to see […]
Flash to be stopped in Office 365
If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of the past. Over a week ago, Microsoft announced that Office 365 would completely block said media by January 2019. Microsoft recently announced plans to eventually stop the […]
Little-known Windows 10 tips and tricks
Are you making the most out of your Windows 10 computer? If you haven’t tried adjusting system and battery performance, silenced notifications, or used the night light function, then you’re missing out on minor but useful features. Performance/Power slider There are two kinds of computer users: those who value battery longevity and those who prefer […]
How to defend against insider threats
First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents. #1 Educate – The workforce (meaning all healthcare […]
Malware hits 500k IoT devices, Talos reports
A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by new malware called VPNFilter. An earlier version, believed to be launched by a nation-state, targeted Ukraine. How VPNFilter Works Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and […]
"Black Dot of Death" locks iOS messaging app
People who use iPhones, iPads, and Macs are at risk of encountering a Unicode attack that can cause the messaging app to crash and lock up the device. The good news is a workaround has been found which can restore the state of said Apple products. What is going on? A...
Setting up your new laptop with Windows 10
First things first, what should you do with your brand new laptop? You go through the Windows 10 setup, and you’re all done, right? Not really. Your notebook isn’t ready — until you do some tweaking. Let’s get the ball rolling. #1 Check for updates Your new laptop should check for updates automatically, but you […]
How WP security updates impact your site
WordPress (WP) websites require routine updates to keep up with user demands. Some of WP’s most critical updates are security patches, which protect sites from various cyberattacks. But why does your website sometimes act up when you finish running an update, and how can you prevent it? Be cautious with updates In 2017, WP issued […]
How AI improves customer service
Exceptional customer service should be solution-driven, accurate, and fast. For many companies, that means recruiting the best crop of talents who can quickly learn their systems. But nowadays, businesses are turning to artificial intelligence (AI) to improve customer service. How AI capabilities enhance customer service AI has two capabilities that enhance customer service: machine learning […]
The lowdown on virtualization and the cloud
Virtualization and cloud computing are sometimes used interchangeably, and it’s easy to see why people confuse the two. To set the record straight, virtualization is NOT cloud computing. But these two revolutionary technologies often overlap. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If one day […]
How long should business phone systems last?
The phone remains one of the first points of contact businesses have with their customers. That’s why so many companies are upgrading to affordable and hi-tech “VoIP” systems. Voice over IP solutions are a smart investment given their longevity and more. Different phone systems Phones have come a long way, from analog landlines to digital […]
5 new features for Outlook
Lately, Microsoft has given some love to Outlook — not just the desktop app, but also the web and app versions. In fact, they just released a bunch of new and improved features. Let’s take a look. #1 RSVP Outlook makes it fairly simple to invite people to a meeting, but now it will also […]
Windows 10 makes it easy to back up files
Businesses rely on computers for their daily operations, so getting afflicted by ransomware is devastating. It blocks access to all data, which can result in financial losses and the company closing down temporarily or permanently. Fortunately, Windows offers built-in tools and cloud storage options so you won’t have to fear data loss. File History Is […]
Don’t give social media hackers a chance
Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don’t fret; there are several things you can do to protect your Facebook or Twitter account. Lockscreens exist for a reason Make […]
How to prevent your laptop from overheating
Laptops may be more affordable than ever, but we’re also using them for more advanced tasks than ever. This means you run the risk of overheating your laptop and causing long-term damage. Here’s how to avoid that. Causes of overheating Laptops create heat during their normal operation. That’s why they’re designed with internal fans that […]
Get your business noticed using social media
As a startup business owner, you may think social media isn’t worth the effort because no one knows about your business. You may have dabbled in Twitter, Facebook, or LinkedIn and seen minimal (if any) results. What can a business owner with a new brand/product do? Well, it turns out quite a lot. And to […]
New Gmail features you need to use now
The first thing you’ll notice in the new Gmail for web is its uncluttered look, but there’s plenty more to be excited about. Greater security, easy-to-use sidebar apps and inline buttons, and more have been added to improve Gmail users’ experience. Here’s a quick rundown of all the features you need to start using now. […]
The Risk of Not Having Cloud Backup
It is always better to be safe than sorry. And given the fact that files can disappear or be corrupted in an instant, small businesses need robust data backup systems in place. Without one, you could very well lose lots of money and have your hard-earned reputation irrevocably damaged. How should you go about choosing […]
How to get virtualization working
Virtualization is available in every modern computer. It allows you to create additional virtual environments that run on your actual hardware. Sometimes, though, it won’t work right and results in errors. Here are steps to get it working properly. #1 Enable Virtualization in Your BIOS In most cases, virtualization won’t work because it’s disabled in […]
How HIPAA Impacts Social Media Usage
Social Media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements to the public. However, careless posts that have client or patient-specific information could ruin the reputation of any healthcare organization. On April 14, 2003, the “Health Insurance Portability and Accountability Act” (HIPAA) became law with the goal […]
Preventing theft of service in VoIP
VoIP phone systems use the internet just like any PC. Therefore, hackers can gain access to your servers and data network through VoIP phones. Understanding how to combat theft of service in VoIP is critical, and if you want to learn how to do it, read on. What is theft of service? Internet-based calls are […]
OneNote excluded from Office 2019
Microsoft is pushing its users to use the UWP (Universal Windows Platform) app of OneNote which will be included in Microsoft Office 2019 and Office 365. This means the OneNote desktop app will no longer be packed with future versions of Office. Microsoft’s OneNote desktop application is nearing the end of its journey, as the […]
Easy Steps to Create More Space on Windows 10
Hard drive space is a top priority for Windows 10 users. Techies who use budget computers navigate with limited storage or with Solid-State Drive (SSD). Having little disk space obstructs the free flow and enjoyment of using the hard drive, so you need more storage space. Here are some tips to free up your disk. […]
The Facebook data breach scandal explained
Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of these platforms doesn’t guard the information you’ve given it? How does this affect its users? Last month, news broke that a firm known as Cambridge Analytica collected private data from […]
Chrome, Edge, Firefox to Support Biometrics
Google Chrome, Microsoft Edge, and Mozilla Firefox will soon support web-based biometric authentication. The leading internet browsers are expected to allow users to sign into online profiles through fingerprint scanners, voice authentication, facial recognition, and the like. Online biometric authentication through these browsers requires no additional software. Authenticate Your Profile on Your Mobile Device Chrome […]

































