Blog
Connecticut’s New Approach to Improving Cybersecurity
Previously presented on Monday, November 8, 2021 | 12:00 p.m. EST A new...
Phishing Attacks: How to Recognize Them and Keep Business Data Safe
Cybercrime is on the rise, and hackers are using any opportunity to take...
Using Basic Arrays in Excel
An array is a type of formula that can perform multiple calculations on one or...
Working With Graphics in Microsoft Office
Pictures often speak louder than words and MS Office provides us with ample...
Cyber Security Tips – Pretexting
Pretexting is when the bad guys create a false scenario using a made-up...
Favorite Excel Features – Webinar
In this webinar Ronny will share some of her favorite Excel shortcuts, such...
Excel Logical Functions – Webinar
Some of the most common and powerful functions for Excel users are “logical...
U.S. Computer Connection recipient of 2018 Marcum Tech Top 40 Award
Stamford 09/18/18 - The Connecticut Technology Council (CTC) and Marcum LLP...
Avoiding the Latest Sextortion Scam
Sextortion is the process of threatening to release compromising images, audio...
Watch out for These 4 Smishing Scams
If you thought your cell phone was a safe way to avoid being scammed or...
How to Defend against Illicit Cryptocurrency Mining
Cryptocurrency is wildly popular. Whether it’s the well-known Bitcoin or the...
Understanding the Blockchain
Blockchain is an emerging buzzword in the technology sector which is setting...