Blog

Blog

Best Practices for Securing Business Devices When Someone Leaves Your Company

Employee Retention is at An All-Time Low

 
According to Work Institutes 2018 Employee Retention report, employers paid a whopping $600 billion in turnover costs in 2018! Maybe that's because according to their findings, 1 in 4 employees left their current job for a new one in 2018. Read More »

When Your Password Isn't Enough to Protect Your Identity

Ten years ago, it wasn’t that hard to protect your online accounts – a simple password would do just fine for the most part (along with the knowledge that the Nigerian prince emailing you wasn’t really a Nigerian prince). In today's advanced cybercrime world, protecting your identity is a lot harder than it used to be.

Read More »

The Problem with Getting Your Office 365 Contacts on an iPhone

At PTG, we enjoy being able to solve user problems with Office 365. It's this commitment to the user experience that has helped make us a Microsoft Office 365 Partner of the Year, multiple years running. 

Read More »

Microsoft's MyAnalytics Will Show You How Much of the Day You're Wasting

Working smarter - not harder is a goal for many people this year. As screen time and the number of meetings increases for just about everyone across the board, Microsoft has responded by launching a productivity tool called MyAnalytics.

Read More »

60,000 New Emails! What to Do If You Get Subscription Bombed-Part 2

This is Part 2 in a Blog Series About Email Subscription Bombs, Read Part 1 Here.

Email Security Best Practices

While every type of attack can't be stopped, it is crucial to make email safety a priority.

Read More »

60,000 New Emails! This is What Happens When Your Inbox Gets Subscription Bombed.

Hopefully, this has never happened to you. You open your email on Monday morning to find you’re bombarded with “Thank you for your subscription!” emails in all different languages - from all different newsletters you never signed up for. It’s called a “Subscription Bomb,” and while not as prominent as some recent phishing scams, our expert techs have helped clients who have been bombed to mitigate their risk of loss and configure their email settings to fight off future attacks.

Read More »

Why You Should Be Using a Modern Microsoft Sharepoint Site for Flexible, Fast, Mobile-friendly Networking.

Classic Sharepoint has been around since 2002, and, unfortunately, like most software built for simpler times it has been added to, patched and layered over until it has turned into an outdated and bloated beast.

Read More »

How to Add Additional Time Zones and Holidays to Your Outlook Calendar

If you frequently work with people outside of your time zone or country, you know the scheduling hurdles of dealing with different time zones and holidays.

Buried in the Calendar settings in Outlook are a few ways to make this a little easier.

Read More »

Things to do in Office 365 BEFORE you get breached

Cloud-based services, including Office 365, Google for Work, DropBox, and many more, are a big target for cybercriminals. Since the services are not behind your firewall, anyone with access to the internet can try to target your account. And since so much of our information is available on the internet, it makes for a “easy pickings” for the bad guys.

But there are some easy—and free!—things you can do make your Office 365 environment more secure. Unfortunately, almost no one wants to do these things until after their account gets compromised.

 

Read More »

Best Programs for Managing Projects in Office 365

Using a project management application can provide significant benefits to companies looking to streamline processes in their businesses. It can greatly reduce time spent on planning as well as increase team productivity.

If you’re using Office 365, you already have access to multiple apps and platforms to help with project management. Each tool has its own strengths—it’s just a matter of what you’re trying to do.

Read More »
   
Ultimate Guide to Small Business Cyber Security