Changes to Office 365

Changes to Office 365

Whether it’s for the sake of aligning with Windows 10, or not, Office 365 Pro Plus will be upgraded twice a year, in March and September. But what does this mean to business owners like yourself? Will the new update schedule affect how Microsoft plans to deliver and support ProPlus in the future? We’ll answer all that and more.

Does the CIA have access to your router?

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

Get more out of Office 365 with Power BI

Get more out of Office 365 with Power BI

The benefits of Office 365 have totally changed the way most businesses operate, and it’s hard to believe anything else could have been added to make it even better. But lo and behold, Microsoft has added another excellent feature for getting a better return on your productivity software investment.

Keep the Cloud affordable with these tips

Keep the Cloud affordable with these tips

Despite the Cloud being a powerful and cost-effective solution that many small- and medium-sized businesses welcome with open arms, there are hidden costs that some business owners might not be aware of. It might cost you little at first, but it has the potential to snowball and cost more than your weight in gold.

Gmail gets anti-phishing enhancements

Gmail gets anti-phishing enhancements

Although hackers continue to develop new viruses and bug exploits, the most effective weapon in their arsenal is a simple email. All a would-be cybercriminal has to do is write a convincing message (or pretend to be a trustworthy entity) to persuade a victim to download a malware-ridden file or surrender their personal information.

Setting the record straight on containers

Setting the record straight on containers

Virtualization technology and container technology are confusing topics in their own right, and comparing and contrasting them is even harder. Before you can really get into the weeds about how containers differ from virtualization, it’s best to clear up some of the misleading information surrounding how the two technologies work.

Office 365 tips to make your life easier

Office 365 tips to make your life easier

Office 365 receives dozens of changes every month, which explains why some get overlooked. While Office 365 Planner or Microsoft Teams are great tools for maximizing productivity, there are hidden functions and tricks you can use to make life a bit easier for yourself.

Fixing computers drains your firm’s funds

Fixing computers drains your firm’s funds

Aside from overseeing your business’s network security, IT security staff are also adept at fixing personal computers. However, that doesn’t necessarily mean they should. In fact, such occurrences ought to be minimized, if not avoided altogether.

DR tips for hurricane season

DR tips for hurricane season

This year, the National Oceanic and Atmospheric Administration (NOAA) predicts up to four unusually active hurricanes. With that in mind, there’s no better time to test your disaster recovery (DR) plan. But to avoid data loss and expensive downtime from such catastrophes, there are several things that need to be accounted for.

How to optimize website images for SEO

How to optimize website images for SEO

Search engine optimization (SEO) is one of the most difficult and frustrating aspects of running a modern business. Web services and platforms that provide automated SEO reports like WordPress, Google and Raven tools tend to oversimplify their advice.