Blog

Blog

What You Need to Consider Before Implementing BYOD

 More and more businesses are switching to a bring your own device (BYOD) policy for employee computers. In theory, it sounds like a win-win. The company saves money and employees can work on machines they’re already familiar with.

In practice, it’s rarely as easy as that. If you are considering implementing BYOD, there are a few things you need to consider first. BYOD is often harder to manage from an IT standpoint and usually leads to unexpected costs.

Read More »

Four Things You Didn’t Know You Could Insert Into an Outlook Email

If you’re like most professionals, email takes up a lot of your day (probably too much of your day), and there is a good chance you’re using Outlook to do it. Outlook actually has a lot of features that can make email a little less annoying. But a lot of people don’t use these features—mostly because they don’t know about them.

Some of the most convenient features that a lot of people don’t know about are in the “Insert” tab in the email compose window. There is a lot you can quickly insert into email when you’re writing them without having to switch windows or use an outside program.

Read More »

Can you spot a phishing attack? [Quiz]

One of the biggest misconceptions we still run into with companies when it comes to cybersecurity is around phishing. A lot of people think only naive or stupid people fall for phishing attacks. That's just not true.

Cybercriminals have come a long way, and phishing attacks are harder than ever to spot. Follow the link below to test your knowledge about phishing and see if you can spot an attack.

Read More »

Save Time in Microsoft Teams with Slash Commands

Microsoft Teams is the productivity and chat app designed to help companies communicate. Like most Microsoft programs, there is a lot you can do with it and more features are constantly being added. While it’s not overly complicated, there are some nice shortcuts, called slash commands, that can save you time and make Teams just a little bit easier to use.

Slash commands are short commands, typed into the search bar at the top of Microsoft Teams, which help you quickly take an action. They all start with a “/”—hence the name slash commands.

Read More »

Five Things Every Office Manager Needs to Know About Cybersecurity

Office managers are a critical part of any business—their work literally keeps most offices running. What most people don’t realize (including many office managers themselves) is how vital they are to the cybersecurity efforts of their company.

Here are five things every office manager needs to know about cybersecurity:

Read More »

Don’t Make These Mistakes When Implementing New Technology

Wrackspurt Industries is instituting a new software for their employees to use to replace some existing systems. The leadership team at Wrackspurt is excited, since the new software promises to increase productivity and reduce friction between departments.

They’ve heard good things from other companies who use the software and the employees involved in the decision-making process said it would work well. Ernie, who championed the software, has done a trial and thought it has the potential to save the company a lot of money.

Fast forward some. The new software is in place—but not much has changed. Some people use the software a lot. Some people don’t use it at all. Some employees complain that the new software doesn’t do what they need it to do. There were some issues during rollout that meant some data was lost, and some people are still dealing with that. Ernie’s reputation has taken a hit for championing something isn’t going well—even though it’s worked great for other companies.

So, what happened? And how do you prevent it from happening in your business when you make a software or technology change?

Read More »

Watch Out for This Multi-Step Phishing Attack Costing Companies Thousands of Dollars [Video]

 

Don’t want to watch a video? Here’s a summary. Please note, this is not an exact transcript.

We’re talking about a multi-step attack targeting businesses in every industry. This attack can cost you thousands of dollars (we've seen companies lose $100,000+!). We’re a Microsoft partner and have specifically seen this with Office 365 users, but it’s happening with users for all kinds of Cloud accounts, including Office 365, Google for Work, DropBox, etc.

Read More »

When You SHOULDN’T Move Your Business to the Cloud

 You’ve probably heard the benefits of moving your business to the Cloud by now: promises of improved productivity and the ability to work anywhere, without sacrificing your security. And these benefits are real for most companies!

But the Cloud isn’t the perfect fit for every company. If you fit any of these scenarios, moving everything to the Cloud isn’t going to provide these benefits—in fact, it could hurt you.

 

Read More »

When should I upgrade my business from Office 365 to Microsoft 365?

 

If you are already using Office 365, moving to Microsoft 365 is typically a logical jump as your company matures. Microsoft 365 includes parts or all of Office 365, Enterprise Mobility + Security, and Windows 10 (exactly what you get varies by plan), managed in one portal.

The tricky part is knowing when to make the jump, especially if you want to move everyone in your company at once. There are a few times when it makes sense to move:

Read More »

Microsoft Advanced Threat Analytics vs. Advanced Threat Protection: What’s the difference?

Microsoft has cybersecurity products for every area of your network from on-premise servers to desktops to cloud email and storage. However, when you read through a list of names for some of the available security solutions from Microsoft, there might be confusion as to the intended use for each—mostly because the names are all so similar.

Case in point: The Microsoft “Advanced Threat…” line of products: Microsoft Advanced Threat Analytics, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, Office 365 Advanced Threat Protection. Within this list, there are technologies intended for either enterprise, small business or both and for on-premise, cloud or hybrid deployment.

Most importantly, they all serve different purposes and protect different areas of an organization’s infrastructure:

Read More »
   
Ultimate Guide to Small Business Cyber Security