Blog

The 3 things businesses get wrong with their digital marketing—and how to fix them

For all the pronouncements that “email is dead” over the past couple of years, we all still get a lot of it. Email is not going away, it is not a bad thing, and it can be an effective marketing tool for businesses— when done properly. But just in the past few days, I’ve seen some examples of what I call the three most shameful things that bu...

Find out if your personal information has been stolen

How can you hope to protect the login and password information to your banking, credit card, and other crucial websites when your personal data is being stolen wholesale from big corporate and Government databases you have no control over? With the Equifax hack still in the news, many of us are wondering “how can I tell if my personal info has bee...

We just avoided a Phishing attack (and you can, too)

When discussing cybersecurity with companies, we are often asked about phishing attacks and how successful they are. Phishing attacks are cyberattacks carried out against businesses by sending emails that install malware/ransomware/spyware on the victim’s computer if a malicious attachment is opened or a link in the email is clicked. In our previ...

How the cloud makes scheduling meetings outside your organization simple

Everyone who uses Microsoft Outlook at their company knows scheduling a meeting is simple. You click the calendar icon, add the names of your co-workers, and you can pick the best time and room for your meeting or even get Outlook to automatically choose. While most people think it is difficult scheduling meetings with those outside of your organi...

These are the five ways the cloud changes everything for your business

The key value cloud technologies provide to entrepreneurs is the ability to get more done, from anywhere, and at a lower cost. Think about how many so-called "micro-businesses" are run using a smartphone thanks to cloud-based services—an unheard of scenario just a few years ago. Accessing everything needed to get work done from anywhere they...

This Is Why You Need To Worry About Smishing

When we described Social Engineering Attacks, we talked about phishing (cyber attacks carried out using email). Phishing is all about convincing you to act immediately by clicking on a link, or opening an attached document, and results in a hacker getting access to your sensitive business or personal information. If you follow the few simple rule...

Instant Efficiency Gains With Updated Active Directory Data

Millions of businesses around the world either have used or are using Microsoft Active Directory (AD) services on their corporate networks. Used to identify and manage authorized network users, AD has been around for over fifteen years. However, few companies take full advantage of AD's capabilities in the social media age. With a few simple tweak...

Office 365 documents

As a user of Office 365, there are quite a few locations where documents can be stored so it's worth knowing all the different locations available within Office 365: SharePoint Team site document libraries Office 365 Group document libraries, inc. Microsoft Teams document libraries OneDrive for Business OneDrive E-mail attachments...