Feeling The Love?

Feeling The Love?

There is a lot to love about the work that you do, and hopefully, your technology is part of that. Loving your IT means having a great relationship not only with the devices, software, and applications you use each day, but with the folks who look after them.   If you’ve stopped feeling that spark…

What Is Customer Lockbox And Privileged Access Management In Office 365

What Is Customer Lockbox And Privileged Access Management In Office 365

  Microsoft Office 365 is a suite of services that includes Customer Lockbox and Privileged Access Management. Both tools to assist customers in meeting their compliance obligations and maximizing data security and privacy. These tools are currently only available for customers with Office 365 Enterprise and Advanced Compliance SKUs. Privileged accounts are being compromised more rapidly every day and…

14-yr-old Teen Who Discovered Eavesdropping Bug to Be Paid by Apple

14-yr-old Teen Who Discovered Eavesdropping Bug to Be Paid by Apple

Apple is yet to disclose how much it is going to reward a 14-year-old U.S. teenager for discovering a massive security breach on its FaceTime video call system. It is believed that part of the reward money will be set aside for his high school education fund. On Thursday, Grant Thompson noticed the group FaceTime bug while on a…

The Most Common Errors Local Businesses Make When Hiring an IT Consultant

The Most Common Errors Local Businesses Make When Hiring an IT Consultant

Hiring an IT consultant is a proven method of boosting small to midsize businesses beyond their current capabilities. Rather than hiring full-time employees or tying up internal resources, businesses can allow an IT consultant to do some of the heavy lifting. That’s not to suggest that hiring an IT consultant does not have some pitfalls. Here are…

How To Create A Photo Calendar In Microsoft PowerPoint

How To Create A Photo Calendar In Microsoft PowerPoint

 What Can You Use Personalized PowerPoint Photo Calendars for? A personalized photo calendar is a great way to provide loved ones with updated family pictures during holidays and birthdays. You can print them out on regular paper or cardstock, or send your projects to family and friends digitally. It’s simple to complete in Microsoft…

Ransomware Explained

Ransomware Explained

Ransomware. Ransomware. You have heard the word and know it involves a cyberattack. You assume from news reports that it only happens to large companies like Target, Equifax, and Marriott Hotels for example, and that cybercriminals will not want to bother with your small or medium-sized business (SMB). Unfortunately, that assumption is wrong. The Federal…

Are You Part Of The 55% That Fails To Offer Security Training To Staff Members?

Are You Part Of The 55% That Fails To Offer Security Training To Staff Members?

Making sure the employees that rely on computer systems are trained in cybersecurity is the easiest way to avoid compromising attacks. However, only about 45 percent of business organizations actually make sure their employees are properly trained through mandatory training, and roughly 10 percent make cybersecurity an optional training. This information is alarming for a…

Data Privacy Day: Respecting Privacy, Safeguarding Data, and Enabling Trust

Data Privacy Day: Respecting Privacy, Safeguarding Data, and Enabling Trust

There is no better time than Jan. 28 to turn your attention to the importance of data privacy and all that it entails. During National Data Privacy Day, numerous businesses, nonprofit organizations, government entities, and individuals will come together to spread awareness about safeguarding data, protecting privacy, preventing information theft, and other issues that affect…

4 Rock Solid Reasons Why Outsourcing Your IT Support Is A Smart Move

4 Rock Solid Reasons Why Outsourcing Your IT Support Is A Smart Move

As a business owner, one of your most pressing concerns should be improving the technology that drives your business. There are so many reasons to care about your company’s IT. Here are just a few: Your customers and clients will inevitably want better technology Your employees need to do their jobs Cyber hacking is a…

What Are The Top Cybersecurity Predictions For 2019?

What Are The Top Cybersecurity Predictions For 2019?

Several events in 2018 brought cybersecurity to the forefront of public consciousness, as major sectors– from financial institutions to Facebook– were affected by cybercrime. According to Forbes, 34 percent of US consumers had their personal information compromised in 2018. Security experts and business leaders are constantly looking for ways to keep two steps ahead of hackers. As we…