Blog / Reports / Resources

Setting Up and Managing Contacts in Microsoft Outlook

Setting Up and Managing Contacts in Microsoft Outlook

There’s no denying that email contacts are the modern-day equivalent of the traditional address book. For modern businesses, digital contacts are a company’s lifeline. They provide the means of connecting with clients, collaborating with team members and communicating...

read more
When’s the Last Time You Checked on Your Domain Name?

When’s the Last Time You Checked on Your Domain Name?

For today’s business owners, web presence is everything. Making an impact online is how most modern businesses generate leads and make an impact on their target markets. A big part of a company’s online presence is their domain name. Your domain names serve as your...

read more
Using Technology to Boost Non-Profit Success

Using Technology to Boost Non-Profit Success

Non-profits that utilize technology find that it creates engagement, automates the fundraising process, improves emergency response time, and leads to higher levels of success. “Before the Parade Passes By,” the great song from the Broadway smash musical, “Hello,...

read more
Major Internet Outage Cripples the United States

Major Internet Outage Cripples the United States

We are issuing a warning to businesses that there is a major internet outage being reported across the United States today. The issue is being reported by several major outlets including Comcast, Verizon, and AT&T. Comcast is calling it an “external network...

read more
GIBON – The Next Ransomware Threat

GIBON – The Next Ransomware Threat

The latest strain of ransomware — GIBON — is making the rounds; make sure your business knows how to protect against it. Ransomware is now a household name, and there’s no going back. Even though cybercriminals have been using ransomware for years...

read more
Warning: Dangerous New Ransomware Attacks

Warning: Dangerous New Ransomware Attacks

GIBON is a new type of ransomware that first emerged on the scene last week and has since been utilized in a wide range of cyber-attacks. The main way this GIBON-variant is spread is by malspam with an attached malicious document, which contain macros that will...

read more
Understand the Role:  Becoming an A+ Compliance Manager

Understand the Role: Becoming an A+ Compliance Manager

Becoming an A+ compliance manager may not be the most intuitive prospect, but with careful attention to what the role entails and the right IT help, you’ll get there.   While most people assign compliance to the same snooze-worthy category as watching paint dry, it’s...

read more
Apple Update Leaves Users One-Step Forward & One Step Back

Apple Update Leaves Users One-Step Forward & One Step Back

Latest Update Includes KRACK Patch but Comes Alongside News of iOS Zero-day Vulnerability On November 1st, 2017, Apple released its latest stream of updates for a variety of devices and programs across its product line. First and foremost, the update has a number of...

read more
How To Manage Your Email  

How To Manage Your Email  

Learn how to implement the five-folder email system and get rid of email overload.   It’s easy to become a slave to your email inbox. Unless you take control and implement a strategy, those emails can become just an unruly inbox, especially when you’re using email for...

read more
Remember: Daylight Savings Time This Weekend

Remember: Daylight Savings Time This Weekend

REMINDER: Daylight Saving Time Ends Sunday, November 5th: Make Sure Your Employees are Ready to Fall Back Safely When talking about Daylight saving time and business productivity, the focus is often placed on when Daylight saving time begins in the Spring. We lose an...

read more
Help Employees Understand Cyber Threats  

Help Employees Understand Cyber Threats  

Companies can combat a lack of employee awareness about cyber-attacks by offering regular, consistent training, communication, and awareness A recent study by Wombat Security Technologies reveals some startlingly alarming insights about workers’ awareness of...

read more
Which MS Office 365 Plan is Best for Your Business?  

Which MS Office 365 Plan is Best for Your Business?  

Which Version of Microsoft Office 365 for Businesses or Enterprises is Best for You? It’s easy for most businesses to justify a switch to MS Office 365.  Microsoft keeps their apps updated and has a good reputation for providing robust, industry-standard...

read more
We’ll Will Help You Recover From Tropical Storm Philippe

We’ll Will Help You Recover From Tropical Storm Philippe

As your trusted IT service provider, we are available to provide any Business Continuity support needed by companies affected by the heavy rains and power outages across the northeast. The latest tropical storm to hit the US — known as tropical storm Phillippe...

read more
13 Time Saving Shortcuts for Microsoft Word

13 Time Saving Shortcuts for Microsoft Word

These Microsoft Word shortcuts will save your fingers and your time with quick keyboard tricks and little-known Microsoft Office secrets.   Whether you own an Apple or IBM product, chances are you will use Microsoft Word at home, at work, or at your friend’s...

read more
Meet Alan! Your Typical Small Business Owner

Meet Alan! Your Typical Small Business Owner

Alan owns a small business and he works hard every day to ensure his business is successful. Alan has realized that to be successful, he must be 100% focused on the things that matter…. Things like… …  winning new business …. keeping his customers happy …  managing...

read more
The Very Latest Cyber Threats To Your Business

The Very Latest Cyber Threats To Your Business

Whether in business, at home or out at play we are connected to the internet all day, all the time.   We check our smartphones every five seconds.  As a business, it’s much of the same thing.  We are connected with the office, with clients, and with vendors.  You...

read more
Why Every Business Should Consider Outsourcing IT Services

Why Every Business Should Consider Outsourcing IT Services

There’s no denying that today information is more accessible and easier to obtain than ever before.  From the internet, tablets, smartphones, and even your laptop information is everywhere and can be accessed from anywhere.  But do we know all the ins and outs of...

read more
New Ransomware Attack Called Bad Rabbit

New Ransomware Attack Called Bad Rabbit

NotPetya Malware Refuses to Let Up – Latest Malware Variant Bad Rabbit Targets Business Owners and is Spreading Fast Since Tuesday, reports of the Bad Rabbit ransomware virus have been flashing across news screens everywhere. The virus started its rampage in Europe,...

read more