Newsletter

Tip of the Week: Using Word to Create Company Letterhead

There’s a lot to be gained by utilizing a company letterhead on your correspondence and other printed materials, especially in terms of company recognition and professional impression. Utilizing Microsoft Word makes it easy to add this detail to your documents. For this week’s tip, we’ll show you how easy it is to create a letterhead in Word. Open Microsoft Word...

Read More

Can You Answer These 5 Crucial Questions About Your Data Backup?

Of any solution that might help your business out of a jam, a data backup is possibly the most important. However, a backup is only as reliable as it is configured to be. To ensure your backup is optimized to your business’ needs, we’ve compiled a few questions to ask as you examine your backup solution. Is the right data...

Read More

Keep Your Guard Up Against VoIP Fraud

As with all innovative technology, there is only a certain amount of time you’ll have until someone inevitably finds ways to exploit it. One such exploitation of a common technology that has flown under the radar and avoided widespread knowledge by users is VoIP fraud. VoIP fraud is no different than other cybercrime - the exploitation of a network or...

Read More

Tip of the Week: Consider Using Your Own Router

Your Internet connection is arguably one of the most important parts of your information systems, but you might find yourself limited by the hardware provided by your Internet service provider (ISP). This could come in the form of a modem-router combination provided by your ISP, which prompts the question of whether or not you really need to use what they...

Read More

When Designing A Data Backup Plan, Give Tape A Pass

If you suddenly were to find yourself in a data-loss situation, you would want to have some sort of backup in place to protect your critical data. However, not all backup solutions are the same, and some will do a better job than others at keeping your data safe while remaining convenient to the needs of a business. As an...

Read More

Cracking Multi-Factor Authentication Requires A Lot More Than Guessing A Password

When discussing identity authentication when IT is concerned, the use of passwords is most likely the first thing to pop into one’s mind. However, there are other methods of authentication that may be combined with the use of a password to increase security. This practice is known as Multi-Factor Authentication, or MFA, although it is also called Two-Factor Authentication, or...

Read More

Make Sure Your Software Is Licensed, Or The BSA May Come Knocking

Despite what some songs say, the best things in life aren’t always free. Take, for instance, your software. If you or one of your employees find and download a “free” version of some business-critical application instead of properly purchasing a license, you risk catching the eye of the BSA. Founded by Microsoft in 1988, the Software Alliance (also known as...

Read More

Tip of the Week: 4 Tricks to Excel at Excel

When it comes to creating spreadsheets, the go-to option for many businesses is Microsoft Excel. There are a few little-known tricks that can make creating your Excel spreadsheets even faster. For this week’s tip, we’ll go over a few. Repeat Last Command - If you want to copy the formatting and properties of one cell to another group of cells,...

Read More

5 Questions to Ask When Selecting a Cloud Solution

The cloud is swiftly becoming the method by which most computing is done, especially as far as businesses are concerned. You may have been considering adding the cloud to your own IT strategy. However, in order to make your best decision, there are a few questions you need to ask Is this option a part of the public cloud, or...

Read More

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

When it comes to hacking and cybercrime, it can literally be a few seconds that will ruin your business. One single chink in your network’s armor is all it takes for your data to be compromised. Modern SMBs need to take every opportunity to ensure they’re using best practices to help keep their network safe and secure. Here’s a look...

Read More