When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the pandemic has changed the way that we see the workplace. It’s now a world made up of several connected “mini-offices” located inRead More
The biggest software vulnerabilities
Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developerRead More
6 IT policies all companies should implement
Many smaller businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. But this way of thinking causes issues for business owners. Employees aren’t mind readers. Things that you think are obvious, mightRead More
5 steps to follow if you lose your mobile device
Reduce risk when you lose mobile device Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more.Read More
Beware: Reply-chain phishing attacks
Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. 80% of surveyed security professionals say that phishing campaigns have significantly increased post-pandemic. PhishingRead More
Overview: Microsoft Productivity Score
Microsoft 365’s tools discover productivity goldmine Productivity can be challenging to track, no matter where employees are working. How do you know they’re using their tools as effectively as possible? How can you enable them to adopt best practices? YouRead More