Blog

Six Gmail tips you should start using

Six Gmail tips you should start using

24 hours seem to pass by in the blink of an eye, especially if you’re a small-business owner. In order to stand a chance against your competition, the last thing you should do is bury yourself in a mound of endless emails. With the following Gmail tips and tricks, you’ll be able to spend less time with your inbox and more time driving business growth.

Microsoft enhances Workplace Analytics

Microsoft enhances Workplace Analytics

Microsoft’s Workplace Analytics is a handy tool for managers who would like to assess their employees’ performance using data from Office 365 programs. Whereas MyAnalytics provides employees with an overview of their own productivity data, Workplace Analytics allows both employees and managers to view performance rates to evaluate individual productivity.

You’ve Been HACKED! What’s the First Thing You Should Do?

You’ve Been HACKED! What’s the First Thing You Should Do?

There’s always a chance that IT security will be breached, and one way to make a bad situation worse is not knowing the standard operating procedure when it happens. First, contact your IT personnel. The faster they can address the hack and figure out its extent, the better served you’ll be.

Security Update July 2017

Security Update July 2017

Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebook.com. All you have to do is accidentally fatfinger ONE letter in the URL and up pops a very legitimatelooking fake copy of the site you were trying to get to – and the login and links are full of keylogger malware and virus landmines waiting for you to click on them.

Free Cyber-Security Audit Will Reveal Where Your Computer Network Is Exposed and How to Protect Your Company Now

Free Cyber-Security Audit Will Reveal Where Your Computer Network Is Exposed and How to Protect Your Company Now

At no cost or obligation, our highly skilled team of IT pros will come to your office and conduct a comprehensive Cyber Security Audit to uncover loopholes in your company’s IT security.

After the audit is done, we’ll prepare a customized “Report Of Findings” that will reveal specific vulnerabilities and provide a Prioritized Action Plan for getting these security problems addressed fast.