How to Add Voting Options to an Outlook Email
Need to take a quick poll? Maybe you need to find out how many people in the office are coming to lunch — and this quick tip will show you how the voting options work in Outlook! To making voting options available in an email you are composing: Click on the Options tab on the Ribbon. In […]
How to secure your iPad and keep it that way
used with permission from Norton by Symantec iPads and other tablet computers are everywhere: in the coffee shop, at your children’s school, at your book club, at the department store. Chances are, you or someone you know uses a tablet computer regularly. But should you be worried about security? Are tablet computers like the iPad […]
October 2019 Business Continuity Tip
Human Error Is the Root Yahoo, Equifax, and Uber are just a few of the companies that have suffered data breaches recently, exposing the sensitive information of millions of people. What do all these breaches have in common? Human error is the root cause: Using weak passwords, clicking on a phishing link, failing to update software […]
6 managed service provider benefits for SMBs
Managed service provider benefits can be a life ring for IT pros at small and midsized businesses (SMBs), as many SMBs struggle to maintain their aging infrastructure on limited resources. It’s time to consider strategies to improve business performance and determine whether it’s time to outsource. A managed service provider (MSP) can act as a […]
What You Need to Know About Wi-Fi 6
used with permission from HP Tech@Work Speed, efficiency and upscale multitasking Wi-Fi 6 is making its much-anticipated entry into the consumer market this year. But the next generation of Wi-Fi isn’t just an accelerated version of the Wi-Fi you’re using right now. It’s the latest stage in Wi-Fi’s evolution as it works to accommodate the […]
4 smart reasons to upgrade
used with permission from HP Tech@Work Is it time to consider replacing your business computers? So, you’re a small business owner and confident you’re on the path to success. You’ve defined your target market. Set realistic goals. Carved out your budget. Hired top talent. Even solidified your marketing plan. As a result, you’re thriving. Congratulations! […]
Why AI and 5G make a good team
Used with the permission of http://thenetwork.cisco.com by Anne Field When combined, the technologies pack a powerful punch. It’s the meeting of two much-hyped and potentially transformative technologies.In one corner, there’s a newbie, 5G — higher bandwidth networks promising super-fast speed and increased responsiveness and reliability. And in the other, artificial intelligence (AI)—technology that can analyze […]
5 Tips on PC Recycling
used with permission from HP Tech@Work How do I dispose of obsolete computers? Many of us have similar concerns: Will it cost money? Do I have options? Is it OK to throw old computers in a recycling bin? Is there help available if I’m not sure how to recycle my electronics? Could my personal data […]
7 Ways to Defend – or Polish – Your Online Reputation
used with permission from HP Tech@Work More than ever, people are scouring the internet for information before purchasing a product or service. Websites such as Yelp, Facebook, Google, and Twitter guide prospective customers to first impressions that will influence their ultimate decisions. A few biting reviews—or even one axe-wielding customer or disgruntled former employee—can push […]
September 2019 Business Continuity Tip
3 Tips for Preventing Hacking Don’t assume that because you’re a small organization you won’t get hacked. Small businesses are just as much as a target for hackers as large corporations. Here are some basic tips to help prevent hackers from breaching your system. (But remember, no security defense is foolproof: You need a multi-layered […]
2018 data breach: What we learned from last year’s doozies
used with permission from Tektonika (HP) Jasmine W. Gordon Cybersecurity incidents just don’t have the same shock value they used to—not after Facebook, Uber, Target, and Equifax were all breached. However, even if you ignored 2018 data breach news, there were some absolute whoppers, including two incidents which likely exposed data on the entire population […]
3 Simple Things to Protect Against Cyberattacks
used with permission from SBA.gov by Anita Campbell You might not be able to hire a full-time cybersecurity specialist or install top-of-the-line software, but protecting your business’s data doesn’t necessarily need to be complicated or expensive There were nearly 42,000 online security incidents around the world over the past year. And about 43 percent of […]