Happy 2018! For 40% of Americans, the new year means setting a New Year’s Resolution – have you made one? What about for your business? In 2018, we challenge you to make your (business) New Year’s Resolution to take data security seriously. But not just that – we challenge you to make cybersecurity a habit.Read More »
2017 is coming to a close, and we’re counting down our top blogs post of the year. Most of these posts weren’t written in 2017, but continue to be our most popular posts.
Not surprisingly, most of these focus on Office 365. We’re happy to see a security-based blog on here! Cybercriminals often target businesses based on the technology they use and knowing the red flags and warning signs to look out for is a huge step in the right direction towards keeping your business secure.Read More »
If you don’t currently outsource your technology needs to an IT company, the DIY approach can seem more cost-effective. But outsourcing your IT needs can save you money in the long run, even though you’ll be adding a bill every month.
Here’s how (be sure to check below the infographic for more explanation!):Read More »
Picture this: One of your employees downloaded a malicious attachment from an email, and now some of your company’s files are encrypted. Your company has fallen victim to a ransomware attack. What do you do with the employee? If your answer involves punishing the employee, you need to think again, or you could be setting your company up for more attacks in the future.
One of the absolute worst things you can do for your company’s data security is punish employees for falling victim to a cyber attack. Let us repeat that: do not punish your employees for falling victim to a data breach.Read More »
Microsoft recently introduced Microsoft 365 – a suite of tools including Windows 10, Office 365 and Enterprise Mobility + Security (EMS) under one license. It’s an excellent solution for businesses looking to simplify their technology management while keeping their business secure.
But like everything else, it has its pros and cons and won’t be the right solution for every business.
Read More »
There’s probably a massive hole in your cybersecurity. It’s probably been there for years. You probably already know about it – you may even be the main culprit behind it. And you probably don’t even realize it’s a security risk: Shadow IT.
Shadow IT refers to the use of any hardware or software in a company that is not approved by the IT department. Examples include: employees using different software to edit photos, storing company files on their personal flash drives, or simply using a different internet browser to check their email.Read More »
As technology expands to impact nearly every business process, from customer service to business strategy, the role of the IT department is expanding along with it. IT is no longer only responsible for setting up computer systems, maintaining the server, and running the help desk.
The IT team is the keeper of the treasure that data has become. With IT’s services, leadership teams can better understand their customers, predict changes in the market, understand how to streamline business processes for improved productivity, determine where inefficiencies are cutting into profits, and spot new opportunities for innovation and growth.Read More »
PTG has been fortunate enough to be named one of “The Best Places to Work” in South Carolina for four consecutive years (in the top 10 every year!) in a list put together by the South Carolina Chamber of Commerce and the Best Companies group.
The process for making this list is largely dependent on the responses to an employee survey (a few dozen agree/disagree questions and a couple open ended questions) about the employee experience. I always enjoy getting the responses from the survey. It shows the areas where our team members think that we are doing a great job of making PTG a great place to work.Read More »
3.7 million employees (2.8% of the workforce) now work from home for at least half of their working hours. The number of employees working remotely (not including the self-employed population) has grown 10x faster than the rest of the workforce since 2005.
There's a reason remote teams are becoming more popular. When geographic location is no longer a constraint, employers can attract talent from anywhere. Companies no longer need to be headquartered in large metropolitan areas to access top talent, and workers can live anywhere they like.Read More »
There are a ton of cool apps spread across Office 365 – but my favorite is OneNote. As a business owner, I am frequently in meetings. Inevitably, I come out of these meetings with lots of ideas, questions, follow ups, or to-dos.
Before OneNote, I would capture these in a regular notebook (or an index card). As someone who 1) has extremely bad hand writing and 2) has a hard time keeping up with slips of paper, I was constantly letting things slip through the cracks.
Since switching to OneNote, that has changed. I can access my notes from any location and any device (as long as I have internet access) without having to worry about keeping up with a physical notebook. Just as important - I can actually read my notes now.Read More »