Blog

Blog

Five Fast Facts about Microsoft 365

Microsoft recently introduced a new product called Microsoft 365, centered around making business more productive and more secure. While it’s not going to be for every business, it’s a natural fit for many businesses – especially if you’re already using (or looking to move to) Office 365 or Windows 10.

Here’s what you need to know:

Read More »

Why You Should Be Testing Your Employees' Data Security Knowledge

You’re only as strong as your weakest link, and when it comes to data security in business, your weakest link is typically your employees. Not because of malicious motives – but because it only takes one click on a bad link or opening the wrong attachment to put your whole business in jeopardy.

To reduce the chances of your company falling victim to ransomware or another cyber-attack, your employees should know the red flags of a cyber-attack – and you should be regularly testing them on their knowledge.

Read More »

Microsoft 365 vs. Office 365: What’s the difference?

There is a lot to be said for consistency in product names, but when you have dozens of products with multiple versions of each, similar names can get confusing fast. We’re looking at you, Microsoft.

Microsoft recently introduced Microsoft 365, a bundle of existing products under one license, geared towards businesses. The name is similar to the already existing Office 365 (and the recently renamed Dynamics 365). In fact, a lot of people already inadvertently called Office 365 by the name Microsoft 365.

So, it’s easy to see how the two products can be confused. It gets even more confusing when you learn Microsoft 365 includes Office 365.

Let's break down the differences:

Read More »

From the Trenches: Reused email causes SharePoint Issue

Using an email address with only the first name or just first name and last initial works well for most small businesses. But it can occasionally cause confusion when you have multiple employees with the same name.

Normally, that’s when both employees still work there. We recently ran into a customer case where having a new employee with the same name as an old employee caused an onboarding issue in Office 365, specifically when adding the user to SharePoint Online sites.

Read More »

From the Trenches: Out of Office Phishing Scam

Phishing scams are not uncommon. Years ago, the "Nigerian Prince" versions of phishing attacks targeting as many people as possible, hoping to get a few people to fall for it. These days, cyber criminals put in a bit more effort and do their research on their potential victims first. 

We’ve seen a phishing scam going around recently targeting companies will high-level employees who are out of office (we’ve even experienced it first hand). The scammers are using this as an opportunity to try to get lower level employees to wire large sums of money to this.

Read More »

What Happens When Ransomware isn’t Really Ransomware

Ransomware has been making big headlines recently. The WannaCry ransomware attack knocked out systems all over the world in May. In late June, another massive ransomware attack (called Petya, ExPetr, or NotPetya) hit companies in Europe, taking down major companies like Reckitt Benckiser.

Except this latest ransomware attack wasn’t actually ransomware – it was worse. According to Kaspersky Labs, it was wiperware disguised to look like ransomware.

Read More »

How to Do Data Security on a Small Budget

By now, you probably already know that data security isn’t really optional anymore – even for small businesses. Cyber attacks are increasingly common and more and more small businesses are falling victim. But as a small business, you just don’t have the same resources as an enterprise to spend on cyber security. The thing is – cyber criminals know this, too.

You may be wondering if it is even possible to entertain the idea of data security on a small budget. Absolutely. All it takes is some careful planning and knowing what you need as a baseline.

Read More »

Five Things to Look for in an IT Support Company

In a small business, it’s not uncommon for technical problems to be handled be whoever happens to be the most tech savvy person on the team. That can work for a little while, but it’s not a sustainable practice.

Your team should be focused on meeting your organizational goals – not dealing with technology problems. Outsourcing your IT needs can help alleviate the burden so you can get back to business.

Here are five things to look for when looking for an IT support company:

Read More »

Cyber Security Q&A: The Basics for Business Owners

Data security isn’t exactly a fun topic of conversation. It’s usually stories of companies getting hacked, consumer data being stolen and IT companies and security companies like us running around yelling “The sky is falling!”

But, the unfortunate reality is, as a business owner, data security is something you can’t ignore (about that sky…). It doesn’t have to be your main topic of thought, but it needs to be on your radar. PTG CEO Reed Wilson recently participated in a Cyber Security Round Table for GSA Business Report to cover some of the basics you should know.

Read More »

How to write a communication plan for a successful IT project

A large part of what we do as an IT company is deliver complex IT projects, from line-of-business application upgrades up to cloud migrations. In our experience, people focus so heavily on the technology that they forget about the people that are going to be using the technology.

Don’t get me wrong, the technology is important – but if people don’t understand how they are going to be impacted, what they need to do, and when they need to do it; the project has failed before it even starts. A comprehensive communication plan is vital to any IT project success.

Read More »
   

Subscribe to Our Newsletter