Locking Down Endpoint Security

Mobile Devices on Your Network? Use Endpoint Security Software Mobile devices used for telecommuting can compromise your network. To keep your sensitive data safe, use a firewall, antivirus and endpoint security software.   In today’s mobile environment, companies that offer employees the opportunity to telecommute often gain the upper hand. But allowing workers to access…

Read More

Managed Services SLAs: What Should You Expect to See?

Key Things to Look for in Your Managed Services SLA When you hire an MSP, you must sign a service level agreement. Here’s how to evaluate your SLA and ensure you’re getting what you expect from this relationship.   As if choosing the right managed service provider wasn’t enough, it’s also crucial to make sure…

Read More

Microsoft Teams Update: They Just Made It Even Better

Are you already experiencing the time-saving collaboration tools and productivity tools in Microsoft Teams? Wait until you see the 2019 Microsoft Teams Update. It’s no secret to you that no one is an island when it comes to getting complex jobs done within an organization. But coordinating team efforts, keeping everyone on the same page…

Read More

Free Microsoft Outlook Training

Every month, we host Microsoft Office and other technology training sessions. Our training sessions are completely free of charge and are available “on-demand”.  Yes, you can tune-in whenever and wherever you like.   This month’s training session: 4 Ways To Use Microsoft Outlook Efficiently. Our in-house Microsoft training specialist, Dawn, will guide you through some…

Read More

To Lease or Buy a Copier?

Should You Buy a Copier or Lease It? Trying to decide whether to lease a copier or buy a copier? Find out the pros and cons. See when buying or leasing may be the best option for your business.   No single piece of equipment in the office takes more of a beating than the…

Read More

Factsheet on Mobile Applications and Cybersecurity

FaceApp, the AI-powered photo editing app, went viral for quite a while until various experts expressed concerns about cybersecurity. In light of these concerns, we’ve put together a quick factsheet on mobile applications and cybersecurity. Here are a few tried and true ways to protect yourself: Download applications from trusted sources only and do your…

Read More

How to Automate Microsoft Outlook Email Responses

Automate Email Replies in Four Ways to Share Information Better Learn how to use four powerful tools to automate Microsoft Outlook email responses, including Automatic Replies, Quick Parts, Signatures and Templates   Managing email responses, especially if you are a busy executive looking to keep in touch with clients, colleagues, investors and partners. Watch the…

Read More

The Evolution of MSPs and the Benefits of Using Them

MSPs and How They Developed Over Time MSPs provide specialized services to small businesses who may not be able to hire a full staff of professionals.   Small business owners with limited resources can’t always afford to hire the professionals they need to help manage their business. They have the same basic needs as larger…

Read More

Google Docs Being Used to Attack Users With TrickBot Banking Trojan

Watch Your Google Docs: Program Being Used to Disseminate TrickBot Malware Beware of any Google Doc emails you receive. Cyber attackers are using the word processing program for a phishing scam that disseminates TrickBot malware.   Take extra caution if you receive a Google Docs document sharing email in the near future — it may be…

Read More