Technical professionals. Trusted advisors. Certified expertise.

HCS Blog

Problem-solving by Apple Certified Professionals
Apr
01

Three Tricks for Dealing with Duplicated Contacts

Three Tricks for Dealing with Duplicated Contacts

In today’s world, there’s no reason to remember our contacts’ phone numbers or email addresses—that’s a job for our Macs, iPhones, and iPads. This sort of data is so core to using digital devices that Apple has long provided an ecosystem-wide solution in the form of Contacts and syncing through iCloud.

Unfortunately, it’s all too common to end up with multiple cards for the same person in Contacts, either precise duplicates or versions that contain different details. Further muddying the situation, many of us have multiple contact accounts—such as from Google or Microsoft Exchange—and some contacts may be duplicated across several accounts.

Continue reading
Apr
01

Increase Business Cybersecurity Awareness in Light of Russian Invasion of Ukraine

Increase Business Cybersecurity Awareness in Light of Russian Invasion of Ukraine

For several decades, Russia has targeted a wide variety of cyberattacks at countries with which it has had disputes. That includes the United States and other Western nations, which have recently levied unprecedented sanctions against Russia after it invaded Ukraine. President Biden has warned that “Russia could conduct malicious cyber activity against the United States” in response, encouraging the private sector to increase the protection of systems and networks. This isn’t theoretical—the US Cybersecurity & Infrastructure Security Agency lists numerous such attacks in the last five years.

It’s tempting to think that your business is too small or unimportant to be targeted in a Russian cyberattack. While that may be true of direct infiltration by individual Russian hackers, many cyberattacks are carried out indiscriminately by bots—the ultimate is the DDoS (distributed denial of service) attack that uses compromised computers and Internet-of-things devices to flood a targeted server or company with an unmanageable amount of random Internet traffic. Plus, a common hacking approach is to compromise an account on one seemingly unrelated system as a stepping stone to another, more secure system.

Continue reading
Mar
01

Can’t Rotate the Screen on an iPad or iPhone? Fix the Problem in Control Center

Can’t Rotate the Screen on an iPad or iPhone? Fix the Problem in Control Center

Normally, when you rotate an iPad, the screen happily flips from portrait (vertical) to landscape (horizontal) orientation as appropriate. Rotating an iPhone has the same effect in some apps, though many are written to work only in one orientation. If you ever end up in a situation where your device’s screen doesn’t rotate when you think it should, the reason is likely that Rotation Lock has been turned on in Control Center. Swipe down from the top-right corner of your screen (or up from the bottom of the screen on a Touch ID iPhone) and disable the Rotation Lock button. You can turn it on again later if you ever want to prevent the screen from rotating temporarily.

(Featured image by iStock.com/Jacephoto)

Mar
01

Extend Your Battery Life in macOS 12 Monterey with Low Power Mode

Extend Your Battery Life in macOS 12 Monterey with Low Power Mode

We’ve become accustomed to our iPhones and iPads switching into Low Power Mode to preserve battery life, and you can enable it manually if you want to reduce power usage for a day. New in macOS 12 Monterey for the MacBook Air and MacBook Pro is a similar feature, though you must enable it manually. Open System Preferences > Battery, click Battery in the sidebar, and select Low Power Mode. It reduces the screen brightness automatically and may decrease CPU performance. Make sure to turn it off once you don’t need it anymore.

(Featured image by iStock.com/Pascal Kiszon)

Mar
01

Apple Works to Improve Safety in the Wake of AirTag Stalking Reports

Apple Works to Improve Safety in the Wake of AirTag Stalking Reports

Over the past few months, there has been a spate of media reports about how people may have been tracked without their knowledge using AirTags, Apple’s elegant location trackers. Like many mainstream media forays into the tech world, the reports are often short on detail and sometimes unclear on the reality of how the AirTags work. Nor is it clear that there have been many successful cases of AirTag abuse, but the mere fact that people are trying to use AirTags to stalk others is concerning.

Apple put significant effort into preventing such abuses, revolving around three features:

Continue reading

Locations


New York

Connecticut
Florida
Louisiana
Chicago

Corporate Headquarters
New York

80 Orville Drive Suite 100
Bohemia, NY 11716
Tel: (866) 518-9672
This email address is being protected from spambots. You need JavaScript enabled to view it.

Connecticut

65 High Ridge Road #510
Stamford, CT 06905
Tel: (866) 518-9672
This email address is being protected from spambots. You need JavaScript enabled to view it.

Florida

3321 SW 194th Terrace
Miramar, FL 33029
Tel: (866) 518-9672
This email address is being protected from spambots. You need JavaScript enabled to view it.

Louisiana

218 Barksdale Drive
Broussard LA 70518
This email address is being protected from spambots. You need JavaScript enabled to view it.

Chicago

4 Knollwood Place
Joliet, IL 60433
This email address is being protected from spambots. You need JavaScript enabled to view it.

London

10 Grosvenor Court
Rayners Road
London SW15 2AX UK

Stay Connected

© Copyright 2023, HCS Technology Group. All Rights Reserved.