Blog / Reports / Resources

Microsoft Office Lens Lets You Scan Virtually Anything

How Microsoft Office Lens Lets You Scan Virtually Anything As businesses move online, more of their documents become virtual. Even with the mass migration to the digital world, however, there’s still plenty of work done on paper and other real-world canvases....

read more
Did You Really “Reply All” On That Last Email?

Did You Really “Reply All” On That Last Email?

Office Workers Rejoice: Microsoft is Finally Subduing the Dreaded’ Reply All’ Do never-ending reply-all threads emails put a damper on your business chewing up precious time and resources? The good news is, Microsoft rolled out Reply-All-Storm Protection...

read more
Are You Ready For Pandemic 2.0?

Are You Ready For Pandemic 2.0?

Will We Have Another Wave Of COVID-19? Dr. Anthony Fauci has made clear that he is almost certain the novel coronavirus will come back in the fall. Even so, a whopping 42% of CFOs don’t have a plan for what to do if the pandemic and accompanying shutdowns hit...

read more
Microsoft Outlook:  FindTime With Colleagues

Microsoft Outlook: FindTime With Colleagues

Everything You Need to Know About Operating and Using FindTime Scheduling meetings seems like it should be an easy task. However, anyone who does business knows with everyone’s busy schedules how difficult it can be to find a time that works for everyone who...

read more
How to Use Microsoft Teams

How to Use Microsoft Teams

How to Use Microsoft Teams Technology Microsoft Teams has quickly become one of the most popular tools businesses are using as employees have migrated to working from home. How can your business best use Teams and its features to keep employees connected and...

read more
Microsoft Teams Options Improve Remote Presentations

Microsoft Teams Options Improve Remote Presentations

Microsoft Teams Options Improve Remote Presentations Until the recent rollout of Microsoft Teams background customization feature, videoconferencing was a sometimes less-then-enviable communication vehicle. Users would have to tidy up the workspace, scrunch the camera...

read more
COVID-19: Safety How to Clean Your Phone Effectively

COVID-19: Safety How to Clean Your Phone Effectively

How to Protect Your Phone From the Coronavirus Find out how long the coronavirus can live on your phone. Learn how the coronavirus gets onto phones. Get tips on how to clean your phone or other devices.  Around the world, people are taking unprecedented measures to...

read more
Hackers Target Zoom Meetings for Cyberattacks

Hackers Target Zoom Meetings for Cyberattacks

Zoom Scrambles to Address Cybersecurity Issues in Meeting Platform As the usage of Zoom has skyrocketed during the coronavirus outbreak, the company has had to respond quickly to security flaws and potential phishing attacks   As Zoom usage skyrockets around the...

read more
What You Need to Know About Two Factor Authentication

What You Need to Know About Two Factor Authentication

Everything You Should Know About Two Factor Authentication Does your business use 2FA? With the prevalence of data breaches today, it’s time to start employing this simple security feature within your business.   Without a doubt, you’ve read and heard about the...

read more
Smart Steps When Working From Home

Smart Steps When Working From Home

Working From Home Due to Coronavirus? Consider These Tips If you’re suddenly working from home due to the coronavirus, maximize productivity with a dedicated workspace, enjoyable breaks, and engagement with colleagues.   For the vast numbers of Americans suddenly...

read more
Remote Workforces Deliver Business & Employee Benefits

Remote Workforces Deliver Business & Employee Benefits

When considering the employee and employer benefits of working remotely, businesses are wise to change. The alternative could make your outfit less competitive.   If you would like to gain a little perspective on how radically our culture has changed, try this...

read more
What Is Two Factor Authentication?

What Is Two Factor Authentication?

Protect Yourself – Use Two-Factor Authentication for Your Business Learn about what two-factor authentication is and how it works. Once you understand its benefits you will see how helpful it could be for your business.     Two-factor authentication is...

read more
[Video] What Is Ransomware?

[Video] What Is Ransomware?

What Is Ransomware: 5 Tips To Protect Your Business Ransomware can damage and take a heavy financial toll on your business. What is ransomware and 5 tips you can take to protect your business today?     For businesses and organizations of all types, the Internet...

read more
Use SharePoint to Keep Business Data Organized

Use SharePoint to Keep Business Data Organized

Metadata Gives You Control of Disorganized Online Filing Systems SharePoint gives you a simple solution to keep your online files organized, using metadata to create customized ways to sort and find the information you need. It’s an all-too-common occurrence....

read more

Ransomware Explained…

Ransomware is a form of malware that encrypts your files and demands a ransom payment in exchange for the decryption key. I put together a video that explains how it works and how to stay safe. Take a look and let me know your thoughts… Watch the video below or click...

read more
7 Myths Small Businesses Still Believe About PC Technology

7 Myths Small Businesses Still Believe About PC Technology

The 7 PC Myths Draining Your Business Technology Budget Evaluating your business technology budget? These 7 PC myths could be costing you a lot of money. From slow computers to hacker vulnerability, see how to fix it.   Think you’re saving money by keeping those...

read more
Bolster Cybersecurity Readiness with Strategic Investments

Bolster Cybersecurity Readiness with Strategic Investments

Bolster Cybersecurity Readiness with Strategic Investments Protecting your organization from cybercriminals is gaining complexity and requiring more resources than ever before. Do your leaders understand the implications of a lack of cybersecurity funding?   Every...

read more
Hackers Increasingly Targeting Business Conversations

Hackers Increasingly Targeting Business Conversations

‘Conversation hijacking’ Seeks Sensitive Business Intelligence Your employees probably know not to open unexpected file attachments or click on random links, but what if an attachment arrives as part of an email conversation with trusted colleagues?...

read more

January 28th: Data Privacy Day

Data Privacy Day commemorates the anniversary of the signing of the first international treaty focused on data protection. Here’s how you can get involved.   January 28th, Data Privacy Day 2020, is here. First introduced in January of 2008, Data Privacy Day...

read more
What You Need to Know about Cyber Security

What You Need to Know about Cyber Security

Cybersecurity education is essential in order to keep businesses one step ahead of this evolving space. Learn about types of attacks and preventative actions. Cyber solutions are the future of business, with innovation such as the Internet of Things (IoT) gaining...

read more
Scammers Convinced Erie Employee to Wire Million Dollars

Scammers Convinced Erie Employee to Wire Million Dollars

Small Town Reeling After BEC Scammers Get Employee to Wire $1M Would you fall for this scam that cost a small town $1M? Find out what a BEC scam is, how it works, and what you can do to keep your company from falling victim. What would you do if you found out your...

read more
Keeping You Safe from Juice Jacking

Keeping You Safe from Juice Jacking

Learn about juice jacking and how to prevent you or employees from becoming a victim.  Here’s a new cyber threat to worry about: Juice Jacking. Read on to learn what about juice jacking and how to prevent yourself or employees from becoming a victim. What Is Juice...

read more
Important Cybersecurity Warning

Important Cybersecurity Warning

Have you been following the news lately? The recent events between the United States and the Islamic Republic of Iran are causing some concerns across the cybersecurity community. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a very important...

read more
3 Tips Will Help Save Your Computer from Ransomware

3 Tips Will Help Save Your Computer from Ransomware

Quick Tips to Save Your Computer from Ransomware Are you struggling to remove vicious ransomware from your computer? These quick tips will help you (safely!) access information on your computer and get back online in no time.   You’ve heard about ransomware...

read more
Watch Out! Windows 7 Loses Support in January

Watch Out! Windows 7 Loses Support in January

Careful – Your Windows 7 Loses Support in January 2020 If you use Windows 7, you need to be aware that Microsoft will end support for your operating system in January 2020. Now is the time to upgrade to Windows 10.   Windows 7 is an operating system that still...

read more
Juice Jacking: The Next Cyberattack

Juice Jacking: The Next Cyberattack

Juice Jacking is another creative way that cyber attackers are accessing your data. Learn more about the concept and how to prevent it.   The public must be on guard for any cyberattack that comes their way; however, attackers are creative and are constantly...

read more