The productivity suite is one of the most utilized software combos going. Usually it comes with a word processor, a spreadsheet program, a note taking program, and a presentation creator. There are other pieces of software included in some of today’s most dynamic options, but for our purposes we are going to limit it to these.
Subcategories from this category:Miscellaneous, IT Blog, Technology, How to, Cloud, Alerts, Off Topic/Fun, Best practices, Business, Uncategorized, Tip of the Week, Security, Business
It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witnessed in terms of the technology we use. Let’s consider some of these principles, and how they’ve changed over time (if at all).
The new year is upon us and after the debacle that 2020 was, it is extremely welcome. If you are like us, you have a new set of goals that you’ve created for yourself and are probably looking to improve your professional and personal well-being. One way to do that is to ensure that your accounts are secure. Today, we will be going through how to update your password with Microsoft.
Going through your passwords and updating them every so often is a very wise habit to get into, particularly when they are used to protect a lot of data—as the password to your Google account often is. Considering this, let’s go over how to update your Google password and otherwise lock down your account.
Few technologies in our time have been as anticipated as the fifth generation of wireless communications. 5G, as it is colloquially known, is promising to bring a whole new level of automation to society and business. One place 5G is sure to make big waves is with the Internet of Things, the billions of smart devices and services that are increasingly being leaned on as a new economy emerges. Today, we will take a brief look at 5G’s current state, its capabilities, and what it means for the future of the Internet of Things.
Cloud computing has been one of the most utilized tools for business in 2020. The COVID-19 pandemic has made it crucial for businesses to give remote access to tools and one effective way to make that happen was to look to the cloud. This has expanded an already booming market and presents businesses of all sizes with the opportunity to get the computing they need without huge upfront costs. Today, we’ll take a look at the cloud computing market and how you can leverage hosted computing solutions to improve your business.
If you’ve lost or misplaced your smartphone (or tablet), it’s critical that you act quickly. Every second counts, especially if you suspect that your device was stolen. Here are the steps you need to follow immediately, even if you think you simply left it at a restaurant or in the backseat of a taxi.
Nobody intends to lose their smartphone. For some of us, our mobile device is glued to our hands for a good portion of the day—it’s hard to imagine simply leaving it somewhere, right?
Mistakes happen. It doesn’t take more than a few minutes to set your smartphone up so you can track it down easily if you lose it.
2020 was a contentious—and for the wireless industry, momentous—year. Marking the official start of 5G networks, 2020’s events amongst mobile providers helped to reinvigorate an industry, while making some considerable shifts in the balance. Let’s consider some of these changes, and how the industry will continue to change for some time moving forward as 5G continues to grow.
2020, unsurprisingly, has decided to go out with a bang, as it has been revealed that the United States was targeted in the largest cyberespionage attack to date. Let’s go over what this attack means, and how things will need to play out in the future.
In the United States, the political scene is extremely divisive. This can be seen in nearly every political arena including the ongoing debate over who should have regulatory power over the Internet. In 2017, the Federal Communications Commission voted, three votes to two, to repeal the Net Neutrality rules that were implemented by the same regulatory body just two years prior. Today, with a new administration being sworn in in less than a month, we thought we’d revisit the net neutrality rules and see where we stand at present.
The small business owner is always looking for a way to either cut costs or to get more value out of their technology. Today, many businesses are looking to automated tools fueled by AI to do just that. Today, we thought we would talk a little bit about AI for small business and how it works to help increase business productivity.
For all the attention that we (and many others) give to cybercrime, people are still falling victim to hacks and scams every day. With most businesses operating more in the digital sphere than ever before, it stands to reason that they need to do more to keep from being a victim of a data breach or worse. Here are six things your business should do to keep from being a victim of a cyberattack.
Let me ask you a quick question: when was your critical business technology last updated? When do your software licenses expire? When did your printer last have any maintenance performed on it?
With how business is conducted today, the capability of your workforce to stay connected while mobile is important. However, it can be equally important that this connectivity doesn’t come at the cost of their manners. Let’s go over a few ways to be more polite as you work remotely using a mobile device.
Quick, off the top of your head, how many network switches are in use at your office? How many wireless access points? How many routers are past their warranty or no longer getting support?
That’s not a question most business owners are asked on a regular basis, and we don’t really expect you to be able to rattle off the answers. You should have all of that information documented though.
The strangest year in our lives is coming to a close and the holidays figure to be just as strange. With the COVID-19 pandemic still roaring away, there probably won’t be a lot of the events that are typical this time of year. That doesn’t have to ruin the time of year, however. Today, we thought that we would take a look at five cool tech gadgets and services that won’t break the bank, but will also be a cool addition under the tree or for your secret santa.
PDFs have been around for a while and they have become an extremely useful file format for business. One of the best features of the PDF is that it is useful for securing signatures so that contracts can be handled over the Internet. Today, we’ll go over how you go about signing a PDF in Windows.
Despite the name being mildly amusing, phishing attacks are no laughing matter. These scams, in all their different forms, wreak havoc on businesses—ranking as the top breach threat in the 2020 edition of Verizon’s annual Data Breach Investigations Report, and successfully impacting 65 percent of United States organizations in 2019 as reported by Proofpoint’s 2020 State of the Phish Report. Avoiding them requires you to be able to spot them, so let’s go over the different varieties of phishing that can be encountered.