Archive for 'blog'

Privacy Alert! Disclosure of Personal Data

Pretending to be a “geneology” website, has a lot of personal information like your birth date, home address, phones, relatives and more.

Anyone can get too much personal information in seconds so if you’re concerned about privacy, visit the “Opt Out” link, search for your info and remove yourself: 

Remove Your Name From This Creepy ‘Family History’ Site—If You Can
Continue Reading →

Ransomware is About to Get a Lot Worse

Ransomware has unfortunately been shown to be an effective way to target not only businesses large and small alike, but hospitals, police, individuals – virtually everyone.  It is effective because it locks up your files- that could mean pictures or word documents or whatever is important to you.  The criminals will “unlock” them only if you pay a ransom.  Unfortunately too many people do not have good backups and they pay the money, spurring interest in the criminals to continue ...

Continue Reading →

Encryption in Office 365

used with permission from Microsoft

Office 365 Message Encryption is an easy-to-use service that lets email users send encrypted messages to people inside or outside their organization. Designated recipients can easily view their encrypted messages and return encrypted replies. Regardless of the destination email service—whether it’s, Yahoo, Gmail, or another service—email users can send confidential business communications with an added level of protection against unauthorized access.

  • There are many scenarios in which email message encryption ...
Continue Reading →

How to Turn Off Clutter in Outlook / Office 365

Clutter is a mailbox management feature of Office 365 for Business. (If you don’t have an Office 365 for Business subscription, you will not have this feature.) It analyzes how you process your email and then moves “unimportant” or low-priority email from your Inbox into a special folder, to save you the time of doing this yourself. Essentially, it sorts emails it thinks you will already ignore into a secondary Inbox. If you already ...

Continue Reading →

Who’s the weakest link?

used with permission from HP Technology at Work

Even if your business is using updated software, firewalls, and antivirus protection, your employees could create a cybersecurity risk. Common errors that employees at all levels make when using technology may prove costly—or even fatal—for your company. How can you best protect your business?

The risks employees pose to your cybersecurity are serious. Two out of three data protection and privacy training professionals say employees are the weakest ...

Continue Reading →

4 ways to be more proficient in Word 2016

used with permission from Microsoft US Small and Midsize Business Blog

#1 Co-author in real time with your team

When you and your team members want to collaborate on a document, forget the pain of emailing it back and forth. Forget worrying about what version you’re working on. You can now use real-time co-authoring to see everyone’s changes as they happen.

Real-time co-authoring in Word 2016 allows for this. It’s been available since 2013 in Office Online. But with Office 2016, we take ...

Continue Reading →

IM on it—why instant messaging is collaboration’s secret weapon

used with permission from Microsoft Office Blogs

Implementing an instant messaging platform is important for productivity for teams of all sizes. Enabling a system for quick, informal, easy-to-reference and mobile chats keeps teams connected for nimble collaborations—resulting in a major value-add to your business.

How much value, exactly? Businesses that have embraced instant messaging practice have seen remarkable improvements in productivity and streamlined communication. According to a survey of employees using chat services conducted by, 75 percent saw ...

Continue Reading →

How Safe Is Surfing on 4G vs. Wi-Fi?

used with permission from Norton by Symantec, by Nadia Kovacs

You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way?

Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these ...

Continue Reading →

Rise in Ransomware Attacks

There has been a significant increase in activity by a malicious ransomware software called Troldesh.

We have recognized that systems that are not actively managed or have no system access management policies are exceptionally susceptible to the current version of ransomware.

What Is Ransomware and Troldesh?

Troldesh is a form of malicious software called ransomware. If infected, your data, and often every fileshare on your network is encrypted and you will be asked to pay a “ransom” to get a ...

Continue Reading →

Three top tips for Microsoft Outlook

used with permission from Microsoft US Small and Midsize Business Blog, by Cindy Bates

Outlook has email, calendar, contacts and task management to help you communicate and stay organized. Here are three tips to help you save time and use Outlook more effectively.*

#1 Schedule delivery of your emails

You can control when your emails are delivered, choosing the date and time.

Here’s what to do:

  1. In your email message, select the Options tab.
  2. In the More Options group, select Delay Delivery.
  3. In the ...
Continue Reading →
Page 1 of 11 12345...»