• Productivity Suites For iPad – How Do The Big Three Stack Up?

    Productivity Suites For iPad – How Do The Big Three Stack Up?

    With the right apps in place, your iPad can function almost exactly like a laptop, and make getting work done on-the-go easy and convenient. A mobile productivity suite allows you to work on projects and documents, share files with coworkers, and even collaborate on a document right from your tablet. For iPad users, there are […]
  • Weekly Tech Tip: Control physical access to computers and network components

    Weekly Tech Tip: Control physical access to computers and network components

    Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key […]
  • McDonald’s Used Tech to Grow Their Business by $1.2 Billion: What Can Tech Do for You?

    McDonald’s Used Tech to Grow Their Business by $1.2 Billion: What Can Tech Do for You?

    McDonald’s has decided to focus on what it does best, and technology is helping them showcase their strengths. See how you can make their success work for you too! Every company moves at their own pace when it comes to technology, and individual organizations are much more likely to embrace it than others. McDonald’s hasn’t […]
  • Wait: Peripheral Devices May Put Your Computer System at Risk

    Wait: Peripheral Devices May Put Your Computer System at Risk

    Peripherals that attach to your system are most likely never patched with security updates. So, your printer or thumb drive may make your system a wide-open gateway to the network. Nearly every business relies on a computer system to function. Peripheral devices such as multifunction printers that scan, copy, and print can be a weak […]
  • The Implications Of A Recent Data Breach

    The Implications Of A Recent Data Breach

    The Cloudflare breach demonstrates the risks of cloud computing but must be understood in the broader context of cyber security As with any new business resource, cloud computing creates both opportunities and risks. Obtaining software and storage from a central hub allows companies to lower their equipment and maintenance costs, but it also makes them […]
  • Don’t Pay That Ransom

    Don’t Pay That Ransom

    How to Protect Your Business from Ransomware Attacks Most of us know about computer hacking, computer viruses, and computer malware. But, did you know about a new threat that is soaring against company computer systems called ransomware? Ransomware happens when a cybercriminal, or gang of criminals targets your business. Once they have successfully infiltrated your […]
  • How Today’s Role Management Tools Can Automate Identity Management

    How Today’s Role Management Tools Can Automate Identity Management

    Automated role management tools can support account management, password management, compliance and identity management all in one user-friendly solution. Business role management involves the creation and maintenance of definitions to manage user permissions related to internal software applications and other resources. Secure, effective role management is part of the framework of every successful enterprise. Role […]
  • Wisdom Wednesday: Twelve Shortcuts Saving Maximum Time Using Microsoft Outlook

    Wisdom Wednesday: Twelve Shortcuts Saving Maximum Time Using Microsoft Outlook

    The latest version of Microsoft Outlook is designed to be a personal information manager, not just email. Learn the shortcut tricks and a user can become a power communicator very quickly.   While many wish there might be another choice, it is unlikely that Microsoft Outlook as a user interface is going to go away […]
  • What The New Administration Could Mean For Healthcare And Healthcare IT

    What The New Administration Could Mean For Healthcare And Healthcare IT

    There has been a lot of talk and speculation about the future of healthcare in America in recent weeks, and the conversation has left many healthcare workers with a lot of still unanswered questions. It’s important to keep in mind that whatever changes may or may not be coming won’t happen all at once, or […]
  • Weekly Tech Tip: Make backup copies of important business data and information

    Weekly Tech Tip: Make backup copies of important business data and information

    Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly, and store the copies either offsite or on the cloud.
  • Wisdom Wednesday: Out Of Office In Microsoft Outlook

    Wisdom Wednesday: Out Of Office In Microsoft Outlook

    How Do I Set My Out Of Office In Microsoft Outlook To Only Send From One Date To Another? In Outlook, click on File, Info then select Automatic Replies (Out of Office). Click on Send Automatic Replies and check the Only send during this time range check box. Specify a start and end time for […]
  • The Implications of Office 365’s Dominance and Slack’s Increasing Rise for Small Businesses

    The Implications of Office 365’s Dominance and Slack’s Increasing Rise for Small Businesses

    Knowing which productivity apps are right for your small business and your employees is tough, but looking at what your peer companies can provide a good starting point. From established companies like Microsoft and its Office 365 suite to upstarts experiencing rapid growth like Slack, productivity apps that purport to help small businesses work smarter […]