vCTO Secure Blog

vCTO Secure has been serving the Seattle area since 2011, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Every Time Google Tells You To Put Glue on Pizza, a Lot of Electricity is Consumed

Every Time Google Tells You To Put Glue on Pizza, a Lot of Electricity is Consumed

You’ve probably noticed that Google searches are sometimes a little different these days. Depending on what you search for, sometimes Google will attempt to provide an AI-generated answer. A lot of Googlers have noticed that sometimes these answers get a little wacky. What’s going on? Why isn’t Google just taking users to websites like they used to? And what is the impact of all this AI stuff?

0 Comments
Continue reading

Can You Tell the Difference Between a Laptop and a Chromebook?

Can You Tell the Difference Between a Laptop and a Chromebook?

Laptops are nothing new for businesses. In fact, some recent laptops have the processing power to eclipse your typical desktop workstation. However, this doesn’t apply to all laptops, as evidenced by the Chromebook. Today, we want to explore the big differences between Chromebooks and your average laptop, as well as how you might choose between one or the other.

0 Comments
Continue reading

How the World’s Most Popular Search Engine Works

How the World’s Most Popular Search Engine Works

Billions of people rely on Google Search to find what they want online. But what really happens when you click "search"? Let's describe how the Google Search engine works to give you a behind-the-scenes look.

0 Comments
Continue reading

Breaking Down the Smart Chips Available for Docs and Sheets

Breaking Down the Smart Chips Available for Docs and Sheets

You might recall our blog last week on smart chips, a term used to describe some fun and useful Google Docs inserts. Today, we want to take a closer look at these smart chips and what you can do with them in Google Docs and Sheets.

0 Comments
Continue reading

What Can Humans Learn About Robots from the Works of Isaac Asimov?

What Can Humans Learn About Robots from the Works of Isaac Asimov?

Are you familiar with the works of Isaac Asimov? The author wrote a short story called “Runaround” in 1942, and it introduced the idea of the Three Laws of Robotics, or laws that all of the robots in his Robots series must follow. This stranger-than-reality concept is being used today by Google, which has announced a set of safeguards partially inspired by these three laws to help it control future AI-powered machines.

0 Comments
Continue reading

You’d Be Surprised What Can Be an Unsafe Google Search

You’d Be Surprised What Can Be an Unsafe Google Search

The Internet is pretty awesome. Unfortunately as much as it provides individuals and businesses, alike, it poses significant risks. Today, we thought we would discuss a security issue that not many people consider, Google searches, and how they can lead to cybersecurity problems. 

0 Comments
Continue reading

AI Fuels the Technology to Make Traffic Lights More Environmentally Friendly

AI Fuels the Technology to Make Traffic Lights More Environmentally Friendly

AI might feel like a technology perfectly at home in the world of science fiction, but the truth is that most of its uses are not nearly as interesting or fun. Take, for example, Operation Green Light, an initiative from Google that aims to better society through examining AI for traffic control and its impact on the environment.

0 Comments
Continue reading

Enhanced Safe Browsing in Gmail Might Not Be the Solution You’re Hoping For

Enhanced Safe Browsing in Gmail Might Not Be the Solution You’re Hoping For

Have you tried using Enhanced Safe Browsing in your Google Chrome browser? This feature has been a part of the browser since 2019, and it was implemented with the intention of preventing phishing attacks. This feature was also recently added to Gmail. Here’s how you enable it, as well as why it might not be the solution you’re hoping for.

0 Comments
Continue reading

Did You Know? Google Pays Billions to Maintain Default Search Rights on Apple Products

Did You Know? Google Pays Billions to Maintain Default Search Rights on Apple Products

Google is one of the world’s biggest technology companies, but have you ever wondered how exactly it manages to maintain its iron grip on the search engine market? It’s especially curious when you consider that there are other major technology companies out there that might want a piece of the pie, like Apple, yet choose not to. Well, it turns out there is a very good reason for that, and as you might suspect, large amounts of money are involved.

0 Comments
Continue reading

Will Your Business Use Google’s New Custom Building Blocks Feature?

Will Your Business Use Google’s New Custom Building Blocks Feature?

Google is always striving to improve its Workspace platform, the business-driven productivity suite for companies. One new tool that could change the way organizations operate is custom building blocks, which add a whole new layer of depth… for schools and businesses, anyway.

0 Comments
Continue reading

Gmail and Google Calendar Add Client-Side Encryption

Gmail and Google Calendar Add Client-Side Encryption

Google is rolling out client-side encryption to Gmail and Calendar, which will allow users to create meeting events as well as send and receive emails that have been encrypted before being sent to Google servers. Client-side encryption will be available to organizations with Google Workspace Enterprise Plus, Education Standard, and Education Plus plans. All other types of Google Workspace accounts and personal Gmail accounts will not get client-side encryption.

0 Comments
Continue reading

Explaining the Work Profile Feature in Android

Explaining the Work Profile Feature in Android

Most people use their smartphones more than any other computing tool, and businesses must adapt to these trends if they want their employees to be as productive as possible. Businesses can capitalize on their employees’ smartphone use if they are strategic in their implementation of mobile device tools and strategies—including work profiles on Android devices.

0 Comments
Continue reading

Get Control Over Your Battery with Google Chrome’s Battery Usage

Get Control Over Your Battery with Google Chrome’s Battery Usage

Google Chrome is a known battery killer, at least in the traditional sense. Since so many people use Chrome for their browsing needs, Google decided to release a new feature in Chrome 108 called Energy Saver. What does this feature do and why is it important to know about?

0 Comments
Continue reading

Tip of the Week: Add Dropdown Menus to Your Excel Spreadsheets

Tip of the Week: Add Dropdown Menus to Your Excel Spreadsheets

If you know how to use functions and various other features that Microsoft Excel and Google Sheets have to offer, then you can take your skills one step further than most. One such feature is the use of dropdown menus within cells. Let’s discuss how you can use them to your benefit in both Excel and Sheets.

0 Comments
Continue reading

Tip of the Week: Create a Calendar Event in Google

Tip of the Week: Create a Calendar Event in Google

How often do you receive requests for meetings or other time-sensitive reminders through your email inbox, only to forget that you signed up for them weeks or months later? Sometimes it can be easier to just add an event to your calendar right from your email inbox. Let’s go over how you can add an event reminder to your Google Calendar right from your Gmail inbox so you never miss an important date or deadline again.

0 Comments
Continue reading

A Quick Look at Google Workspace

A Quick Look at Google Workspace

There are a ton of productivity suites out there, and we’ve all heard of the most common one, Microsoft Office. Still, there are other solutions out there, one of which is Google Workspace. What does Google Workspace offer, and what differentiates it from its competition? Let’s take a closer look and see if we can find the answer to this question.

0 Comments
Continue reading

Handy Shortcuts in Google Chat

Handy Shortcuts in Google Chat

Google Chat—the successor to Hangouts—offers a TON of features to its users, more so than most users probably realize. For instance, there are a lot of features buried under keyboard shortcuts. Let’s go over some of these shortcuts and what you can use them for in Google Chat.

0 Comments
Continue reading

Can Zero-Day Threats Actually Make Chrome More Secure?

Can Zero-Day Threats Actually Make Chrome More Secure?

Google Chrome is a widely used and popular web browser, and because of its popularity, it is a common target for hackers. A recent study showcases how there are more zero-day threats being discovered for Google Chrome, but don’t despair; it might not be a bad thing for your favorite web browser. Instead, it could signify exactly the opposite.

0 Comments
Continue reading

Users of Cloud Services are Under Attack

Users of Cloud Services are Under Attack

Certain methods used by hackers are more effective than others, and it’s largely in part due to these methods working around and subverting popular security measures. They might take on the look of a legitimate email or web source, like social media, in an attempt to convince the user that it is indeed a message they can trust. The latest in this type of hacking attack includes Google Docs.

0 Comments
Continue reading

Tip of the Week: How (and Why) to Find Your IMEI on Android

Tip of the Week: How (and Why) to Find Your IMEI on Android

Wouldn’t it be nice if you had an easy way to track your device even if it were lost or stolen? Thankfully, this feature exists to an extent for Android devices in the form of the IMEI, or international mobile equipment identity number. If you know this number, you could potentially help mitigate the issues that losing a device can present.

0 Comments
Continue reading

Mobile? Grab this Article

QR Code
Dark Web Monitoring

When you visit the Internet, you are more than likely sticking to the pages that can be accessed by typing an address into your browser, or by clicking on a link in a search result.

Find Out More
Contact Us

Learn more about what vCTO Secure can do for your business.

Seattle, Washington

Call us: (206) 895-5595

Protect Your Reputation

With human error causing over 92% of data breaches, we understand the importance of focusing on the weakest link by empowering employees through self-improvement, personal protection, and engaging training that is relate-able, not demeaning.

Find Out More