Blog

Blog

5 Ways to Improve Your To-Do List

For a long time, I was a pen and paper to-do list person. But recently, I’ve been using the Microsoft To-Do app more and more. While a pen and paper to do list is great for a brain dump, using To-Do makes it easier to organize and automate my task list.

Here is how I have used Microsoft To-Do to keep track of my tasks and make it easier to figure out what to do next.

Read More »

6 Things Every Financial Services Firm Needs to Know About Cybersecurity

Financial service firms stand to lose big if they fall victim to an attack. It’s not just your data that’s on the line—it’s your money and your reputation, too. When it comes to putting together a cybersecurity plan to keep your business safe, there are a few things every financial services firm needs to know:

Read More »

How Cybercriminals Use Current Events to Target You

No doubt over the past few weeks you’ve been inundated with emails about privacy policies and email subscription updates as companies worked to meet new EU regulations (GDPR) that went into effect on May 25. Cybercriminals used this flood of emails to their advantage, sending out similar emails to try to trick you out of your password and credit card details or trick you into downloading ransomware.

This is part of a much larger trend of cybercriminals using current events to try to trick you. When you’re expecting to see an email about a particular event or subject, you probably won’t notice something suspicious.

Read More »

What You Need to Do to Secure Your Company's Office 365 Environment

Office 365 operates under a shared security responsibility model—meaning you are responsible for some of the security of your company’s Office 365 environment.

Most notably, you are responsible for access. You are responsible for who you let into your environment, whether intentionally or unintentionally.

 

Read More »

Microsoft 365 Announcements You May Have Missed

In recent weeks, including at last week’s Build conference, Microsoft announced some pretty significant new features for Microsoft 365, making the platform more secure and giving users a more seamless experience across all devices.

Read More »

Three Major Reasons You Should Talk to Your IT Company Before Switching ISPs

Switching internet service providers in your business can seem like no big deal. That $100 per month plan for internet can save you a lot of money and internet is internet, right? There isn’t a reason your IT company needs to be involved, right? Not so fast.

There are actually three pretty big reasons you should involve your IT company before switching internet service providers (ISPs): your IT company can help you make sure you are actually getting what you need and that you’re getting it for the best price—and they can keep your network running while you make the switch.

Read More »

Why CEO Impersonation Attacks are So Hard for Spam Filters to Catch

 

CEO Impersonation attacks, including wire fraud attacks, have become a favorite for cybercriminals because of the potential of a huge payday. A successful attack usually means tricking the victims out of thousands of dollars—we’ve seen up to $100,000 taken. And they’re almost impossible for even the best email filters to catch.

Read More »

How to Solve Most Basic Printer Issues

Have you ever had this happen to you? You’re on your way to a big presentation. You’ve been prepping for days, rehearsing what you are going to say, giving yourself pep talks in the mirror, and have put together a great report.

The last thing you need to do before you step out the door is print—and the printer picks that moment to screw up (my personal favorite is the “printer is offline” error message when it’s not offline).

All of us have been there at some point: dealing with a printer that just doesn’t seem to want to work. It always feels like it comes at the worst possible time, too. It’s one of the most common issues we see as an IT support company, and we experience it in our own business, too.

Thankfully, most printer issues can be solved with basic troubleshooting steps. These are the first few steps we typically take when working on a printer issue:

Read More »

How Two-Factor Authentication Can Stop a Cyberattack in Its Tracks

These days, most cyberattacks are at the account level. If a cybercriminal gets into your account (whether it’s your work account or personal account), they can use it to steal your assets, sell your information on the black market, get access to other accounts, and launch more cyberattacks.

So, what can you do? Two-factor authentication (also called multi-factor authentication) can stop a cyberattack in tracks. In some cases, it can save you even after falling victim to an attack.

Read More »

Our Favorite Features for Saving Time in Outlook

When is the last time you said to yourself “I wish I could spend more time dealing with email – I just love sorting through it.” Probably never, right? For most people, email is a necessary evil.

Read More »
   
Ultimate Guide to Small Business Cyber Security