BLOG
Personal Cybersecurity Protection Tips
Cybersecurity isn't something we leave behind when we leave the workplace. Protecting yourself and your family at home, with your technology and security habits. Here are some tips on how to bring...
Make It a Scam-Free Vacation
Summer's almost over, but some of the years best travel deals are still coming up. Before you head out, take steps to help keep your dream vacation from becoming a nightmare. Do your...
2019 Cybersecurity Trends
What the experts say: Did you know nearly 60 percent of all malware attack victims this past year were small businesses? Many owners of startups and modest-sized companies assume that because they...
Sending & Opening Microsoft Encrypted Email
Encrypting email with Microsoft Sending email is a convenient method of delivering information, but it is NOT private. If you need to send information without the prying eyes of the internet, you...
3 Reasons for Executives to Take Security Awareness Training
Employees at the top of an organization pose the most risk, due to having the most access to sensitive information and critical systems. Here are three reasons why it's important to executives and...
Editing Table Cell Margins in Microsoft Word
If you do a lot of work in Microsoft Word documents, it can be very helpful to know where to find the various options for styling a table. Sometimes tweaking cell padding or cell margins is all you...
Is that website you are on safe?
Would it surprise you to learn that there are over 4 billion internet users in 2018? With over half of the population around the world now surfing the net, there may be an increased opportunity for...
Ensure Your Patient’s Security by Scheduling Computer Upgrades Now
Remember back to 2014 when you had to upgrade from Windows XP to ensure your medical practice’s data was secure and others couldn’t break into your system? For many medical practices, the upgrade...
Do us a favor? Leave a review.
As you may know, we grow our business by letting others know about the positive work we do for businesses like yours in the community. It would mean a lot to me if you could take a few minutes to...
Phishing Identification Checklist
Phishing attempts work when they gain your trust and make you act emotionally. For example, if an email looks like it comes from your bank, you are likely to recognize it and trust it. If it says...