Category Archives: Blog
- Home
- Archive by Category "Blog" (Page 15)
Today was to be the Milwaukee Brewers home 2020 opener. And it’s not.
There is the game itself and then there is the experience of being at the game. What is that experience like for you? Maybe it's getting together with friends or family and grilling out? Maybe it's taking the afternoon off and popping a beer with friends and playing catch or corn hole. What
Pandemic Pro Tip: Use an email rule to file your corona virus-related emails
Winter is over,Spring is here,COVID-19 emails,Disappear. Do you want to be able to read your important emails without an overwhelming amount of corona virus infecting your Outlook inbox, but still want to keep up on the current updates regarding the virus? Read below to find out how to make thi
Can you trust a home computer to run your business while working from home?
What is a trusted computer? Strict definitions aside, a trusted computer is one that is provided, configured, and managed for a specific purpose. In a business, it's a critical tool provided at great expense to access the systems and information you need to do your job effectively and securely
DNC and Coronavirus – Planning to Work From Home
What does the DNC and the coronavirus have in common? Both may have you stay home for an extended period of time. So you might want to ask yourself what the impact may be to your business and how you might operate your business if you, your employees, your partners, or your clients need to stay h
What is Phishing?
Learn how phishing works and how to prevent it. So, what is phishing? Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally
3-2-1 Backup Best Practices Apply to Your Cloud Data
There's a common misconception among Software as a Service (SaaS) users that backup isn't necessary for data because it exists in the cloud. This is untrue. SaaS applications, like Microsoft Office 365, Google G Suite, and Salesforce are just as vulnerable to data loss as on-premise apps. Why? Beca
Facebook Public Security Surprise
Recently I was was surfing Facebook and noticed that someone I didn't know liked one of my photos. My personal Facebook page is for friends only so I was surprised. I used the Audience Selector drop down on the picture and it was set to public. I'm unsure how that happened. I changed the se
Why You Must Use 2FA/MFA!
Two-factor authentication (2FA) or multi-factor authentication (MFA) is critical for securing your cloud-based or remotely accessible systems by adding a second verification step (two-step) in the logon/authentication process. The security of two-step verification lies in its layered approach. Comp