Blog

Blog

The Pros and Cons of Microsoft 365

Microsoft recently introduced Microsoft 365 – a suite of tools including Windows 10, Office 365 and Enterprise Mobility + Security (EMS) under one license. It’s an excellent solution for businesses looking to simplify their technology management while keeping their business secure.

But like everything else, it has its pros and cons and won’t be the right solution for every business.

 

Read More »

Four Types of Phishing Emails Targeting Businesses

Phishing emails can be a big problem for businesses of every size. They can be difficult to detect and prevent and can cost you big time.

One of the reasons they’re so difficult to detect is because they can take on so many forms. A phishing email can look like anything. But there are patterns and some common types to be aware of:

 

Read More »

What is Shadow IT?

 

There’s probably a massive hole in your cybersecurity. It’s probably been there for years. You probably already know about it – you may even be the main culprit behind it. And you probably don’t even realize it’s a security risk: Shadow IT.

Shadow IT refers to the use of any hardware or software in a company that is not approved by the IT department. Examples include: employees using different software to edit photos, storing company files on their personal flash drives, or simply using a different internet browser to check their email.

Read More »

FAQ: Is Office 365 Secure?

One common question among businesses considering Office 365 is “Is it secure?” This is a great question to ask of any software, app, or company with access to your data (and should probably be asked more than it already is). The short answer is yes*, but a lot of the security is your responsibility.

Read More »

Cyber Security in a Cloud World

We speak with business owners every day about how to help make their team more productive, mitigate the risks in their business, and get more done. Recently we’ve noticed a dangerous trend: Business owners treat the ‘cloud’ and the security of the ‘cloud’ the same way that they treated their on-premises networks: In short, they don’t care.

They assume that ‘someone else is taking care of the security. This mindset is extremely dangerous. In the traditional model of on-premises IT infrastructure, it was the responsibility of IT to secure the perimeter of the network. Essentially, that involved installing a good firewall, only opening ports that were needed, purchase good security software – rinse and repeat. With the cloud – this has all changed. While the security of your network is important, in many cases, the network is just the mechanism you use to get out to the cloud, where your data is now physically located.

Read More »

Ignite 2017: What you need to know

A few members of our service team spent last week at Microsoft Ignite, the annual conference for IT admins, engineers, computer scientists and other technical folks. Most every Microsoft conference includes major product announcements, and Ignite 2017 was no exception.

Most focused on the tech side (hello, quantum computing), but there were also some product announcements that will likely affect the day to day of every employee – not just IT admins.

Here’s what you need to know:

Read More »

Running Office 2007? Time to upgrade.

If you’re still running Microsoft Office 2007, you’re going to run into issues in October. A couple dozen Microsoft programs will reach the end of life on October 10, 2017, most notably Microsoft Office Suite 2007. Microsoft is also making a change to Outlook that means Office 365 users with Outlook 2007 will stop receiving emails. If you’re running these programs it’s time to upgrade or risk significant security vulnerabilities and lost productivity.

Read More »

What Role Does IT Play in the Modern Company?

As technology expands to impact nearly every business process, from customer service to business strategy, the role of the IT department is expanding along with it. IT is no longer only responsible for setting up computer systems, maintaining the server, and running the help desk.

The IT team is the keeper of the treasure that data has become. With IT’s services, leadership teams can better understand their customers, predict changes in the market, understand how to streamline business processes for improved productivity, determine where inefficiencies are cutting into profits, and spot new opportunities for innovation and growth.

Read More »

What makes a company one of the Best Places to Work?

PTG has been fortunate enough to be named one of “The Best Places to Work” in South Carolina for four consecutive years (in the top 10 every year!) in a list put together by the South Carolina Chamber of Commerce and the Best Companies group.

The process for making this list is largely dependent on the responses to an employee survey (a few dozen agree/disagree questions and a couple open ended questions) about the employee experience. I always enjoy getting the responses from the survey. It shows the areas where our team members think that we are doing a great job of making PTG a great place to work. 

Read More »

Tips and Tools for a Happy and Productive Remote Team

3.7 million employees (2.8% of the workforce) now work from home for at least half of their working hours. The number of employees working remotely (not including the self-employed population) has grown 10x faster than the rest of the workforce since 2005.

There's a reason remote teams are becoming more popular. When geographic location is no longer a constraint, employers can attract talent from anywhere. Companies no longer need to be headquartered in large metropolitan areas to access top talent, and workers can live anywhere they like.

Read More »
   

Subscribe to Our Newsletter

Ultimate Guide to Small Business Cyber Security