You might have received an email from Google stating that you may be eligible for a refund for apps you purchased through the Google Play Store. This is because PEAK was previously using Google for our email service, then Google decided to cancel their partner program for ISP’s. Many users had spent money on apps, movies, music and other purchases in the Play Store, and can now no longer access them, so they decided to refund those users. If you receive this email, go ahead and fill out the form using your PEAK email address. If accepted you will receive a refund from Google directly.
Continue Reading »
WordPress has a growing number of users who find their sites are getting hacked. WordPress without plugins is mostly secure, but added plugins can leave your site vulnerable. Here are five tips for protecting your site from being hacked.
No matter what the nature of your business, when your computer system goes down your business goes with it. No business can afford to be offline, and so much of our day-to-day operations depend on the Internet and network connectivity.
Continue Reading »
Microsoft just announced today during the 2015 Build conference in San Francisco, CA that the new name for their browser which they’ve been calling “Project Spartan” will be officially titled Microsoft Edge. The Edge naming may not surprise many as it’s the same name given to the new rendering engine (EdgeHTML) that Microsoft is using for its Windows 10 browser.
Look before you click, and be skeptical of e-mails. Do not be a victim of spear phishing!
Do not open email messages when you can’t tell who the real sender is. Oftentimes, “friendly” postcards and mass-messages (chain e-mail) alert readers of danger, while having weird syntax, poor spelling and suspicious web addresses. Keep asking yourself “Why should I believe that?” It is important to remember that you can’t always trust the “from” address on email, as it is easily faked by fraudsters, trojans and viruses. If you aren’t expecting a message, link, or attachment from someone, ask yourself “Why you should I trust that it really came from the apparent sender, and that it’s safe?” When in doubt, it’s a good idea to call and verify that they sent you the message.