Don’t Get Scammed

We are consistently bombarded by hackers, spammers or whatever you like to call them.  They use our phone — voice and text — email, social media, and other devices, to attack us. This is a very lucrative business for the cybercriminals. It is estimated that...

How To Detect a Phishing Email

The ACA Group recently sent out an article about detecting phishing emails.   We added some comments to the article to help explain more about detecting a phishing email. Analyzing the email for indications of phishing provides an opportunity to prepare...

Should you use cloud storage?

Can you restore your files and pictures if they are deleted, corrupted or unusable from your PC or Mac? If your answer is “no,” then keep reading so you do not lose important family pictures, Word/Excel documents, or other import files. Cloud storage has many...