Blog

Blog

2018 PTG Award Winners

Each year, we celebrate our previous year and kick off our new year with an annual Kick Off Party.  We forego the annual Christmas party (not because we are Scrooges, but because it’s such a busy time) and use this time to reflect on our previous year and get geared up for our upcoming year.

At the Kick Off Party, we also give out awards to recognize team members who have had outstanding accomplishments.  If you see any of this year’s award winners – please tell them congratulations! These are the 2018 winners:

Read More »

How to Reset Windows Hello Biometrics

Using biometrics (your fingerprint or your face) to log into your computer can be much more convenient and secure than using a password, especially when used as part of multi-factor authentication. You don’t have to change it frequently, and it’s much harder to steal (though it can be done).

Read More »

Your New Year’s Resolution: Make Cybersecurity a Habit

Happy 2018! For 40% of Americans, the new year means setting a New Year’s Resolution – have you made one? What about for your business? In 2018, we challenge you to make your (business) New Year’s Resolution to take data security seriously. But not just that – we challenge you to make cybersecurity a habit.

Read More »

Our Top Blog Posts of 2017

 2017 is coming to a close, and we’re counting down our top blogs post of the year. Most of these posts weren’t written in 2017, but continue to be our most popular posts.

Not surprisingly, most of these focus on Office 365. We’re happy to see a security-based blog on here! Cybercriminals often target businesses based on the technology they use and knowing the red flags and warning signs to look out for is a huge step in the right direction towards keeping your business secure.

Read More »

How Cybercriminals Use Your Sense of Urgency Against You

Picture this scenario: A low to mid-level employee gets an email from the CEO. He needs the lower level employee to wire him money right away and provides wire transfer information. An important client is upset, and they need this money to keep the client satisfied. Or the CEO is traveling, his wallet was stolen, and he needs money to be able to get a flight home.

The lower-level employee, not wanting to disappoint their superiors or their clients, comply and wire the money quickly, and without question. Except it’s not the CEO. It’s a cybercriminal, this was a phishing attack, and now the company is out thousands of dollars.

This scenario plays out all the time in businesses all over the world. Phishing attacks like these prey on your sense of urgency to scam you out of thousands of dollars.

Read More »

How to Prevent Common Mistakes in Outlook

If you’re a human, you’ve probably had at least one embarrassing moment in your career involving email. Maybe it was an awkward typo, or you called someone by the wrong name. Or you missed an email from a prominent client or your boss.

If you’re using Outlook for email, though, there are a few features and add-ins you can use to help check yourself – or at least give yourself a little extra time to catch your mistakes. 

Read More »

How to Choose the Right Office 365 Plan for Your Business

While multiple options are a good thing, the amount of options you have for Office 365 plans can make it difficult to figure out which is best for your business. There are more than a half dozen licenses to choose from, plus add-ons and Microsoft 365. It can be overwhelming, even if you are used to dealing with it every day.

Some advice before you start: don’t stress about it too much. You can mix and match plans and can change plans at any time. If you get into it and find the plan(s) you chose isn’t working, it’s pretty easy to switch to a different license.

Read More »

5 Ways Outsourcing Your IT Can Help Your Bottom Line

If you don’t currently outsource your technology needs to an IT company, the DIY approach can seem more cost-effective. But outsourcing your IT needs can save you money in the long run, even though you’ll be adding a bill every month.

Here’s how (be sure to check below the infographic for more explanation!):

Read More »

Why Punishment Shouldn’t Be Part of Your Cybersecurity Plan

Picture this: One of your employees downloaded a malicious attachment from an email, and now some of your company’s files are encrypted. Your company has fallen victim to a ransomware attack. What do you do with the employee? If your answer involves punishing the employee, you need to think again, or you could be setting your company up for more attacks in the future.

One of the absolute worst things you can do for your company’s data security is punish employees for falling victim to a cyber attack. Let us repeat that: do not punish your employees for falling victim to a data breach.

Read More »

5 Steps for a Successful Office 365 Migration

One of the best ways to set yourself up for success when moving your business to Office 365 is a seamless migration with no downtime for employees. We've helped hundreds of companies migrate to Office 365 and have picked up some tricks along the way.

Follow these steps for a successful migration:

Read More »
   

Subscribe to Our Newsletter

Ultimate Guide to Small Business Cyber Security