Apex Technology Blog

Apex Technology has been serving the Carolinas since 1998, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

It’s Time to Stop Using Weak Passwords, Period

It’s Time to Stop Using Weak Passwords, Period

Simple passwords are often the bane of a business’ existence. If you routinely use strings like Password, 123456, Guest,  or Qwerty to secure an account, then you need to reexamine your password practices before they lead to a data breach. A good password can go a long way toward helping you in this effort.

376 Hits
0 Comments
Continue reading

Does Technology Make People Happy?

Does Technology Make People Happy?

It’s a technology-driven world. We are surrounded by technology all the time, and some people literally couldn’t do what they do without it. More than would admit, anyway. So with all this technology all over the place, are we happier? This is a big question. Far bigger than we have time for in this blog, but we thought we would unpack the question a little bit and discuss some elements of this new technology-run society that can give us some insight into people’s feelings.

487 Hits
0 Comments
Continue reading

Tip of the Week: How to Copy Excel Worksheets

Tip of the Week: How to Copy Excel Worksheets

If you have ever invested time and effort into an Excel spreadsheet, then you know how irritating it is to move all of that data to a different sheet. Thankfully, you can easily and accurately copy this data using a simple technique. Here’s how you can do it.

401 Hits
0 Comments
Continue reading

A Significant Vulnerability is Present in Apple Devices Through MacKeeper

A Significant Vulnerability is Present in Apple Devices Through MacKeeper

One of the big advantages that Mac computers have had over the traditional PC is that they “don’t get viruses,” but how true is this claim, really? Research conducted by Elastic Security Labs proves that this is certainly not the case, discrediting the prior claims of ads arguing the former.

354 Hits
0 Comments
Continue reading

Why Your Business Needs Cyber Insurance (and What to Look For)

Why Your Business Needs Cyber Insurance (and What to Look For)

We get it—nobody likes to think about the prospect of being impacted by a cybersecurity incident, but it’s like any other unpleasant event in that it is best to prepare for it. In fact, today’s businesses can invest in a cyber insurance policy to help prepare for such an eventuality.

Let’s go over some of the ins and outs of cyber insurance so that you are prepared to make the best choice of provider for your business.

413 Hits
0 Comments
Continue reading

Tip of the Week: Freezing Panes in Your Excel Spreadsheets

Tip of the Week: Freezing Panes in Your Excel Spreadsheets

Microsoft Excel is a great tool for keeping data and figures organized…until, that is, you need to scroll down at all, leaving some important headers out of sight. Fortunately, there is a way to keep your headings in view: freezing the panes they are present in. Let’s go over how to do so.

398 Hits
0 Comments
Continue reading

Make Work Simpler Through Automation

Make Work Simpler Through Automation

All jobs have aspects of them that are simply dull or unengaging. After all, nothing can be exciting all the time. This week we wanted to focus on these rote tasks and what you can do to make them less of an impact on your time and job fulfillment. Turns out, the key to solving this issue stems from technology, specifically the ability to automate said tasks.

410 Hits
0 Comments
Continue reading

Google Got Rid of Search Results Pages

Google Got Rid of Search Results Pages

Countless jokes have been made in the IT world about the perfect place to hide something being page two of Google—just hang out with some IT professionals, and there’s a good chance you’ll hear it. Unfortunately, Google is making a change to its search results that will make this joke completely irrelevant.

405 Hits
0 Comments
Continue reading

Defining a Zero-Day Exploit

Defining a Zero-Day Exploit

With so many threats out in the world, it’s no surprise that some of them target undiscovered vulnerabilities. These types of threats use what are called zero-day exploits to make attempts at your sensitive data and technology infrastructure. What is it about zero-day exploits that you must keep in mind during your day-to-day operations and in planning for the future?

521 Hits
0 Comments
Continue reading

Disney Presents New Tech to Help Re-Age Actors

Disney Presents New Tech to Help Re-Age Actors

Have you ever heard of the Uncanny Valley? It’s the theory that explains why the human race tends to prefer humanoid robots, but only up to a point, after which we find them unsettling. It’s one reason why so many people found the 2019 film Cats bothersome to watch. The Uncanny Valley has also been present in film in recent years, especially when actors who have passed are recreated digitally to make an appearance, or when talent needs to look older or younger than they are.

806 Hits
0 Comments
Continue reading

Tip of the Week: How to Share a Web Page Between Your Phone and Workstation

Tip of the Week: How to Share a Web Page Between Your Phone and Workstation

How often have you been browsing the web on your phone, only to find something that would be legitimately useful for your work—maybe it was a tip you wanted to try out, or a bit of information that would be helpful to know—so you wanted to be able to access it from your workstation? There’s actually a very easy way to make this happen, thanks to the multi-platform nature of the Google Chrome browser.

357 Hits
0 Comments
Continue reading

If “Google” Charges You for a Business Profile, You’re Being Scammed

If “Google” Charges You for a Business Profile, You’re Being Scammed

Let me ask you a question: how much did you pay Google for your Business Profile? Unfortunately, if the answer was anything other than “nothing,” you’ve been scammed. Google has actually announced that they are taking legal action against scammers who impersonated the company in order to defraud small businesses.

524 Hits
0 Comments
Continue reading

Tip of the Week: Make a PDF Out of an Outlook Email

Tip of the Week: Make a PDF Out of an Outlook Email

Have you ever found yourself in a position where you wanted to download an email from your inbox? Whether it’s documentation or a different reason, there is a way to download your messages into a PDF. PDFs make for great file-sharing formats, as the document type preserves formatting and makes editing difficult, preserving authenticity. Let’s go over how you can download an email from your Outlook inbox as a PDF.

285 Hits
0 Comments
Continue reading

This Setting Helps Cap Google Chrome’s Battery Usage

This Setting Helps Cap Google Chrome’s Battery Usage

Google Chrome, used by about two-thirds of Internet users, is an infamous battery hog…or at least, that used to be the case. Google recently released Chrome 108, and with it, a feature called “Energy Saver.” Let’s talk about how to enable it.

479 Hits
0 Comments
Continue reading

Despite Rough Waters, Expect More AI in 2023

Despite Rough Waters, Expect More AI in 2023

There’s no denying that the economic forecast at the moment is a bit bleak, with murmurings of a recession growing louder by the day. As this situation develops, many companies are likely seeking out opportunities to trim the fat. Despite this, however, we anticipate that artificial intelligence will actually see a bit of an uptick. Let’s go over why.

377 Hits
0 Comments
Continue reading

The Metaverse Has Introduced a Complicated Question About Identity

The Metaverse Has Introduced a Complicated Question About Identity

Who are you? While it’s a question that’s been asked in all contexts with all levels of metaphysicality attached—from asking someone their name to prompting someone to follow a path of spiritual self-discovery—the growth of the metaverse once again urges us to ask it in a more literal way. When accessing a conglomeration of various services and platforms, how many identities will each user need to juggle?

541 Hits
0 Comments
Continue reading

How to Make a QR Code in Google Chrome

How to Make a QR Code in Google Chrome

QR codes have cemented themselves as one of the most common technologies used to direct people to important resources or information about goods or services provided by an organization or company. You see them on menus in restaurants, instruction booklets, and even on business cards. How can you make QR codes for your business?

662 Hits
0 Comments
Continue reading

How to Add Dropdown Menus to Your Business Spreadsheets

How to Add Dropdown Menus to Your Business Spreadsheets

Modern spreadsheet programs, like Microsoft Excel or Google Sheets, carry a plethora of functions under the surface that—if used correctly—can take their utility to another level. For instance, the cells in your spreadsheets can be turned into dropdown menus. Let’s go over how to do so in both Excel and Sheets.

507 Hits
0 Comments
Continue reading

Google Joins the Ranks of Businesses Considering Passwordless Authentication

Google Joins the Ranks of Businesses Considering Passwordless Authentication

Passwordless authentication has been increasingly spoken of in favor of the typical password-based method, and is gaining traction the more it is talked about. Google recently took steps toward passwordless that we felt warranted some discussion.

431 Hits
0 Comments
Continue reading

Don’t Get Caught Falling for These Sneaky Spam Tricks

Don’t Get Caught Falling for These Sneaky Spam Tricks

I’m talking about when the heir to the Nigerian throne would reach out to your Hotmail account to help him secure his inheritance, or when an attractive woman or man you’ve never met before would email you out of the blue asking if you were single; spam has always been annoying, but back then, it was clearly just junk that could be ignored.

Today, it’s not so simple.

674 Hits
0 Comments
Continue reading

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you!

 Request a Free Consultation!

Our Partners

  • barracuda-msp-partner-2.png
  • dark-web.png
  • dell-tech-2.png
  • duo-green-2.png
  • IDAgentPartner-partner.png
  • mgma-partner.png
  • ms-partner-silver-3.png
  • sc-partner.png
  • segra-partner.png

Contact us

Learn more about what Apex Technology can do for your business.

Contact Us

Apex Technology
18335 Old Statesville Rd. Suite K
Cornelius, North Carolina 28031

Copyright Apex Technology. All Rights Reserved.