Signs of Laptop Overheating
In our last blog we discussed the dangers that summer weather and activities can pose for your laptop including heat, water and humidity. Unfortunately laptops overheat when left in the sun or when facing temperatures that are high in humidity. If this occurs then your laptop may face serious damage to the internal components and…
Read MoreSummer Dangers – Laptops
Summer is in full swing and that means being outdoors more often, traveling and if you are lucky, working poolside. All of these things are wonderful unless you are a laptop. Even though your business or personal laptops may seem pretty sturdy and tough, it is a fairly delicate piece of machinery that can be…
Read MoreGoogle I/O
On May 17th, Google announced their newest innovation to the technology world. This time around, Google has decided to put AI on the forefront of its latest devices. Follow along for the highlights of the conference! Assistant interfaces – This new addition allows you to type into Google Assistant, or even plugs-in input straight from…
Read MoreProtecting Your Small Business from Cyber Crimes
In the last few months cyber crimes have been all over the news with the WannaCry Ransomware and other hacking events. It may seem like millions of miles away from your small business, but small and medium sized companies are just as vulnerable as larger corporations. You wouldn’t leave the door to your office wide…
Read MoreLaptops at Risk While Traveling
In our global economy many businesses travel expensively to maintain client relations and to take part in conferences on the “latest and greatest” technology for your field of expertise. While the ease of travel is wonderful, your laptop is at risk every time you go mobile. Here are a few ways to protect not only…
Read MoreOnline Safety
At M&H Consulting, we work alongside many small and medium sized businesses. Many of these business are managed by entrepreneurs who also balance work and family life. Many of them ask our expert advice on online safety for the employees, but keep their children safe as well. Whether you are an employee of…
Read MoreKeeping Your Personal Information Secure
Today’s modern employee carries their work with them everywhere they go via smartphones, tablets or laptops. Mainly this can be seen as a convenience, but for employees that carry around not only their work files on their mobile devices, but also personal information this may be a dangerous practice. Here are a few suggestions…
Read MoreLatest Cyber Attack
Just weeks after the WannaCry ransomware was announced, the world has seen yet another disruptive cyber attack. June 27, 2017 a more sophisticated global ransomware attack crippled computers from Eastern Europe to North America. What seems to have originated from a tax software provider in the Ukraine has spread across the continent of Europe and…
Read MoreAmazon Echo Update
Updates are being made to everyone’s favorite: Amazon Echo. Voice calling and messaging are now becoming a possibility straight from Amazon Echo. On May 9th, Amazon announced the launch of the touchscreen Echo Show, which will have features that work on the standard Echo speaker and Echo Dot. This feature includes everything such as asking…
Read MoreWindows 10 Fall Creators
Among several new projects and updates that Microsoft has in the works, they recently released a major new update. Windows 10 Fall Creators Update is set to have a release this September. The Fall Creators Update will be the official debut of Microsoft’s Fluent Design System, previously known as Project Neon. This interface allows building…
Read MoreTips on Being Aware of Hacking
Hacking incidents are inevitable and one can never know if you or someone you know will fall victim to it. There are, however, several different ways to stay safe and stay on top hackers before the hacking is even done. A few of the best ways to do so are: Stay suspicious of emails –…
Read MoreGoogle’s Latest Phishing Hack
Early last month, Google fell under attack in a huge phishing operation. Many received an email that looked similar to an invitation to join a Google Doc from someone they knew on their mailing list. However, once they clicked the link to open the file, you were then directed to grant access to an app…
Read More