How To Show PowerPoint Slides In A Microsoft Teams Meeting

How To Show PowerPoint Slides In A Microsoft Teams Meeting

In today’s tech tip, learn how to make the most out of your Microsoft Teams meetings by showing PowerPoint slides directly in the virtual meeting window. Watch the video below, or click here.   Microsoft Teams is a powerful collaboration tool with a deep, rich feature set. One of the great features in Microsoft Teams […]

read more
Honoring Those Who Gave Their Lives

Honoring Those Who Gave Their Lives

On Memorial Day we remember the veterans who made the ultimate sacrifice for our country. These brave men and women have dedicated their lives to honor the living and make our lives better.     Can’t see the video above?  Click Here. The History Of Memorial Day Memorial day is the most solemn American holiday. Memorial […]

read more
5 Ways Managed IT Services Is the Right Choice for Your Business

5 Ways Managed IT Services Is the Right Choice for Your Business

Choosing a managed IT services firm to handle your business’s IT is the right choice for many businesses. Here are our top 5 reasons why. 1. Focus on Your Business’s Core Competencies Here’s the bottom line: unless you are a managed IT services firm, your core competency isn’t IT services. It’s something else. Every resource you devote […]

read more
Pick the Perfect Meeting Location Using Outlook Mobile

Pick the Perfect Meeting Location Using Outlook Mobile

  Microsoft’s Office suite makes it easy to schedule meetings, reserving the right room and inviting all the right people. Many people think they can only use these powerful features from their office computer, because Exchange calendar integration in iOS doesn’t support these features. In reality, mobile users can still access these powerful scheduling features […]

read more
5 Crucial Elements to Training Your Employees in Optimal Cyber Security

5 Crucial Elements to Training Your Employees in Optimal Cyber Security

Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold your data for ransom, practice espionage, or simply disrupt your business, most hackers cannot access your network without an “in.” In other words, they require a login, personal access codes, or network […]

read more
Here’s What You Need to Know About SD-WAN Technology

Here’s What You Need to Know About SD-WAN Technology

Moving from hardware solutions to software solutions isn’t a new concept for technology professionals, but network infrastructure has traditionally been a hardware-focused world even as applications move to the cloud. With the introduction of SD-WAN, or Software-Defined Wide Area Networks, IT professionals find themselves needing to retool their understanding of flexible networks and security. The […]

read more
Critical Update From Microsoft: Remote Desktop Services

Critical Update From Microsoft: Remote Desktop Services

Impacted Systems: Windows Server 2003 Windows XP Windows7 Windows Server 2008 Nonimpacted Systems: Windows 10 Windows Server 2016 Windows Server 2019 If you are still using Windows Server 2003 or XP, Windows 7, Windows 2008 R2, or Windows 2008 you could be in trouble. A wormable virus may be coming your way. The virus is […]

read more
What Is PII, Non-PII, and Personal Data?

What Is PII, Non-PII, and Personal Data?

Data security becomes more important with each passing year. It’s important to have a good understanding of the terms that both governments and the information security industry use. Understanding these terms will help you lead your organization to comply with today’s regulations as well as whatever new regulations are coming down the pike. Today we’ll […]

read more
Church Hit with Business Email Compromise

Church Hit with Business Email Compromise

There was big business security news out of Brunswick, Ohio (a part of the Cleveland metro area) last month, this time involving a church. According to local reporting, the St. Ambrose Catholic Parish recently announced to parishioners that they had been swindled out of a whopping $1.75 million. The attackers’ methods have real implications for churches […]

read more

Search Our Tech Insights