After deploying several new HP laptops in the past few months, I have noticed once complaint from almost all users. Many users are reporting that their PC will go to sleep after roughly two minutes of not being in use. I had gone through the normal troubleshooting avenues of checking sleep settings and display timeout settings,… Read more about HP Laptops – Unattended Sleep Timeout
Apple is allowing more repair locations globally. These new repair locations will only handle non-warrantied items, this is still a large step for a company that adamantly opposed the Fair Repair Bill of 2017. Warrantied items will still need to be taken to an actual Apple store location or previously authorized dealer. These new repair locations… Read more about Apple Repair
August is the start of the end of summer. Many families are trying to sneak in that last trip to the beach, cabin, or mountains to enjoy time together before school starts back up. College and NFL football is back as training camps begin across the country and Major League Baseball’s division races are warming up. The heat is still… Read more about Back to School Sales Doldrums
If you missed it and are still running Windows 7 and older or Windows Server 2008 R2 and older OS’s, you need to ensure you have applied the latest updates from Microsoft. BlueKeep is a vulnerability that allows for remote code execution on systems that are not patched. Microsoft has also recently come out and said… Read more about BlueKeep
Email, the phisherman’s paradise, the hacker’s delight, the criminal’s new hotness can be deadly when combined with crucial and private information. Ok, so maybe not deadly, but certainly able to cause enough stress to create an ulcer. Here at the HubWise we’ve seen some interesting things going on with email lately, specifically around bank account and routing numbers, social… Read more about Email and ACH, A Deadly Combination
To help you strengthen your credential security, we encourage you to take the following precautions: Review access to your technology tools. It is often an afterthought, but as users leave or changes take place in your organization, you may need to adjust permissions accordingly. It is best practice to grant access to tools that an individual currently needs access to. Any… Read more about Credential Security
What does happen when you lose data? The cost of data loss can be measured in the amount of money that is paid out to recover or attempt to recover lost data. What cannot be accurately tracked is the cost of lost opportunity that occurs when company personnel are focused on recovery instead of their… Read more about What happens when you lose your data?
Microsoft showed off an update to a title they haven’t updated since 2006 at this year’s Electronic Entertainment Expo (E3). It was a surprise for sure, but the game itself wasn’t the most interesting part. Microsoft showed off running footage of their new release of Flight Simulator. While Flight Simulator doesn’t often get a huge… Read more about Flight Simulator – Azure AI