Blog

New Ransomware Is Masquerading as Apps and Games

A new form of ransomware is disguising itself as apps and games to trick people into downloading and launching it…

4 Things You Might Not Have Known about Microsoft Teams

To help facilitate communication and collaboration in businesses, Microsoft offers a solution called Teams. Experts predict that Teams will have…

Severe Weather Update- January 31

The offices of Hungerford Technologies will be closed on Thursday, January 31 due to the severe weather. However, our staff…

Video Trainings

We are excited to announce that with the launch of our updated website we have added a video training section….

5 Noteworthy IT Trends That Will Affect SMBs in 2019 and Beyond

Knowing the direction in which IT is headed can help companies prepare for the opportunities and challenges those changes might…

How to Use iOS 12’s Enhanced ‘Do Not Disturb’ Feature

Sometimes it is important to keep calls and other notifications on your iPhone at bay so you can attend meetings…

2019 IT Budgeting Trends

It’s that time of year again. If you haven’t already approved your  2019 IT budget, it is definitely time to…

Find Out Whether You Are a Data Breach Victim in a Minute or Less

Mozilla has introduced Firefox Monitor, a free tool that you can use to see if your email address has been…

Save Time When Working in Gmail Single-Key Shortcuts

Emailing is a common method of communication in businesses — and Gmail is popular among small and mid-sized businesses, especially…

4 Misconceptions about Tech Support Scams

Tech support scams are common and costly. In 2017 alone, around 11,000 victims filed complaints with the Internet Crime Complaint Center…

3 Insights That Can Help Companies Cultivate a Highly Collaborative Workforce

Collaboration in the workplace is not a new concept. For years, employees have been sharing ideas and working together to…

Credit Freeze
US Data Breach Victims Can Now Request Credit Freezes for Free

Data breaches are common nowadays in the United States. Victims of this type of cyberattack are at risk of identity…