Blog

3 reasons switching from Google Docs to Office 365 is a good idea

For over a decade, Google has tried to win over Microsoft Office users. The one advantage the Google G Suite of productivity apps once had over Microsoft Office was simpler file sharing and better real-time collaboration on documents. By storing Google Documents in the cloud-based Google Drive, users could in one click share the document with anyo...

Don't fall for this email quota limit phishing scam

Have you ever received an email with "Microsoft Outlook 365: Your email quota almost exceeded limit" in the subject line? I recently received one of these emails to my business email address. The email warned that not only I was not only in danger of exceeding my Outlook mailbox limit but that I needed to "review recent activity" in the interest o...

How Skype For Business Changes the Way People Work

While much of the attention related to "work from anywhere" corporate initiatives is focused on mobile apps, the majority of employees still work in an office. Even with the ever-growing number of Millennials in the workplace preferring to use their personal smartphones over a desk phone, most businesses still need a phone system to take and make ...

The 3 things businesses get wrong with their digital marketing—and how to fix them

For all the pronouncements that “email is dead” over the past couple of years, we all still get a lot of it. Email is not going away, it is not a bad thing, and it can be an effective marketing tool for businesses— when done properly. But just in the past few days, I’ve seen some examples of what I call the three most shameful things that bu...

Find out if your personal information has been stolen

How can you hope to protect the login and password information to your banking, credit card, and other crucial websites when your personal data is being stolen wholesale from big corporate and Government databases you have no control over? With the Equifax hack still in the news, many of us are wondering “how can I tell if my personal info has bee...

We just avoided a Phishing attack (and you can, too)

When discussing cybersecurity with companies, we are often asked about phishing attacks and how successful they are. Phishing attacks are cyberattacks carried out against businesses by sending emails that install malware/ransomware/spyware on the victim’s computer if a malicious attachment is opened or a link in the email is clicked. In our previ...

How the cloud makes scheduling meetings outside your organization simple

Everyone who uses Microsoft Outlook at their company knows scheduling a meeting is simple. You click the calendar icon, add the names of your co-workers, and you can pick the best time and room for your meeting or even get Outlook to automatically choose. While most people think it is difficult scheduling meetings with those outside of your organi...

These are the five ways the cloud changes everything for your business

The key value cloud technologies provide to entrepreneurs is the ability to get more done, from anywhere, and at a lower cost. Think about how many so-called "micro-businesses" are run using a smartphone thanks to cloud-based services—an unheard of scenario just a few years ago. Accessing everything needed to get work done from anywhere they...

This Is Why You Need To Worry About Smishing

When we described Social Engineering Attacks, we talked about phishing (cyber attacks carried out using email). Phishing is all about convincing you to act immediately by clicking on a link, or opening an attached document, and results in a hacker getting access to your sensitive business or personal information. If you follow the few simple rule...

Instant Efficiency Gains With Updated Active Directory Data

Millions of businesses around the world either have used or are using Microsoft Active Directory (AD) services on their corporate networks. Used to identify and manage authorized network users, AD has been around for over fifteen years. However, few companies take full advantage of AD's capabilities in the social media age. With a few simple tweak...