Category: blog


Set your Out of Office message in Outlook 2013

If you're going to be out of the office and away from your email, it’s a great idea – and maybe even your company's policy – to set an Out of Office autom...

Small Business, Big Data: How to use data to spot business trends

used with permission from Microsoft For Your Business

What Is Spear Phishing?

used with permission from Norton by Symantec, by Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack o...

Customizing the Ribbon in Outlook 2013

Did you know you can customize the Ribbon in multiple windows in Outlook? If you want to permanently add or remove options to declutter unused tools or make you...

What is a Phishing Email and how could it impact my business?

Phishing emails try to steal your money. They use various techniques to try to get valid usernames, passwords, credit card details & more. Often they pose a...

Crash course: Computer memory

used with permission from HP Technology at Work There are dizzying amounts of memory types in modern computer devices, from DDR SDRAM to L3 caches. And for many...

5 ways you're using the cloud - and didn’t know it

used with permission from HP Technology at Work In 2015, small businesses that moved to the cloud doubled their profits and achieved 25% additional revenue grow...

Change Automatic "Read" Status for Previewed Emails in Outlook 2013

By default, when you preview emails in Outlook, they quickly change to "read" status. If you are using default settings in Outlook 2013, this means the email li...

7 Quick Windows 10 Tips

If you haven’t tried Windows 10 yet, now is the time to start thinking about it and planning for it (verify your programs will be compatible). For those of yo...

5 easy-to-fix tech troubles you can solve yourself

used with permission from HP Technology at Work Technology issues are a thorn in the side of many businesses. Even an action as simple as opening and printing o...

Blog


Rise in Ransomware Attacks
There has been a significant increase in activity by a malicious ransomware soft...
Three top tips for Microsoft Outlook
used with permission from Microsoft US Small and Midsize Business Blog, by Cindy...
Your mobile phone account could be hijacked by an identity thief
used with permission from FTC Business Center Blog, by Lorrie Cranor, Chief Tech...
Address

7 Lincoln Hwy 2nd floor
Edison, NJ 08820

Phone Number

732-549-6030

Copyright 2019 ASIS, LLC.