Kornerstone Technology Blog

Kornerstone Technology Inc. (KSTech) is a provider of technology and business solutions. We also have provided comprehensive support solutions for our customers since 2006.

Tip of the Week: The 4 Most Useful Extensions for Google Chrome

b2ap3_thumbnail_chrome_extentions_400.jpg
If you’re one of the many people who prefer Google Chrome to other browsers, you know all about extensions and how they can improve your browsing experience. These are mostly add-ons that are designed to augment your browsing experience or adding new features. While some aren’t so useful, there are others that are invaluable under the right circumstances. To help you get the most out of Chrome, here are four useful browser extensions that you should take advantage of.

0 Comments
Continue reading

2/3 of Fired Employees Can Access Their Former Company’s Cloud Data AFTER Leaving

b2ap3_thumbnail_rogue_employees_400.jpg
As an employer, you understand that employees come and go. The same group of professionals who helped you build your business will probably be drastically different ten years, or even five years from now. While employee turnover is a natural occurrence, it also presents a certain risk. Believe it or not, a surprising percentage of employees will leave your business one day, and they’ll take some corporate information with them.

0 Comments
Continue reading

Your Solid State Drive May Outlive You

b2ap3_thumbnail_ssd_better_or_worse_400.jpg
When shopping for a new computer, you’re faced with a choice; go with a traditional hard drive (HDD), or a solid state drive (SSD). The benefits of an SSD are many, but are they enough to justify the extra expense?

0 Comments
Continue reading

Tip of the Week: Load Cached Pages in Google Chrome for Offline Browsing

b2ap3_thumbnail_google_chrome_400.jpg
You might have experienced the frustration of reading an article online and having the Internet connection cut out on you. This is one of the most common problems while working with a shoddy WiFi connection. If this happens to you, you can view your browser’s cached pages in order to finish up what you were reading; so long as you’re not trying to view pages like Facebook, which update periodically throughout the day.

0 Comments
Continue reading

3 Easy Ways to Go Incognito In Google Chrome

b2ap3_thumbnail_incognito_mode_400.jpg
The Internet can be a dangerous place. Sometimes you want to keep your identity a secret on the web. Now, your reasons for doing so aren’t any of our business, but you should know that there are several ways to access this secretive function in Google Chrome. Here are three ways you can take advantage of Google Chrome's Incognito mode to browse the web in an anonymous fashion.

1 Comment
Continue reading

Tip of the Week: My Company Device Has Been Lost or Stolen, Now What?

b2ap3_thumbnail_lost_devices_can_be_a_major_problem_400.jpg
Mobile devices are one of the hottest items for thieves to target. According to reports from Consumer Reports and LoJack, 2013 saw the theft of two million laptops and three million handsets. What this means for you is that having your mobile device stolen is probably a lot more likely than you would think.

0 Comments
Continue reading

Tip of the Week: How to Let a Friend Use Your PC Without Compromising Your Data

b2ap3_thumbnail_guest_account_400.jpg
We’ve all been in a situation where you’re asked by someone if they can use your personal computer for whatever reason; checking their social media, email, or just browsing the Internet. Some people, however, also want to protect their privacy, and allowing relatives to use your own account can become problematic. A quality solution to this issue is to create a guest account.

1 Comment
Continue reading

Can a Virtual Infrastructure Be Enough to Guarantee Data Security?

b2ap3_thumbnail_virtualization_security_400.jpg
Every business needs technology in order to function. Yet, if a company’s IT network is overly complicated, then technology will hinder operations, not help it. Enter virtualization, offering business owners a way to simplify their IT infrastructure, as well as make it more secure.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite