Password protect OneNote notes
used with permission from Microsoft by Dail Bridges Do you use OneNote to collaborate on a large team and want to make sure one group doesn’t see the budget? Or do you want to share a notebook with photographs from your last trip and want your friends to see all of them but not your family? …
Read MoreGet smart about security
used with permission from HP Technology at Work Congratulations, you’ve taken every step to secure data on your networks and PCs against increasingly malicious worms, Trojans and viruses. But don’t rest easy. All infrastructure elements, including printers, servers, storage, Wi-Fi networks and cloud computing are just as susceptible to surprising security threats. Forget them and…
Read MoreBusiness Continuity Tip – Cybercrime Goes Mobile
Business Continuity Tip Mobile devices have become an essential tool for everyday life. We check in for flights, make online purchases, access bank accounts, and connect to social media all on mobile-enhanced websites and newly developed applications. The worldwide adoption of the smartphone has prompted cybercriminals to shift their focus toward mobile users and away…
Read MoreAre IT Purchases Hurting Your Bottom Line?
by Stefani Laszko Does the thought of purchasing your first server or replacing an existing one stress you out? Small to medium size businesses need servers for various reasons. Common needs are increased performance, additional file storage or separation of specialized business software. Depending on the specific needs of your business, a new server and…
Read MoreBusiness Continuity Planning: Just the Basics
by Stefani Laszko Business Continuity Planning (BCP) is a pretty daunting topic. Simply asking ‘where do I start?’ is enough to make most business owners run and hide. Regardless, it is a crucial component to the longevity of your business and it cannot be ignored. A well written BCP can consist of hundreds of pages…
Read MoreEt tu, printer?
Et tu, printer? used with permission from HP Technology at Work When you think about protecting your business from security risks, what comes to mind? Most likely, you’re not thinking about your office printers. But you should. Printers found in many businesses these days do more than just print. Many of them also scan, copy,…
Read MoreFighting images in Microsoft Word
Fighting images in Microsoft Word Remember this? You’re working on a document – maybe it’s a report for your sales meeting, a set of instructions for a client, or a promotional flyer – and you are trying to place an image. You’re bumping it down a few keystrokes at a time to get it perfectly…
Read MoreYour business is BYOD. Now what?
Your business is BYOD. Now what? used with permission from HP Technology at Work After serious consideration, you’ve allowed workers to BYOD (bring-your-own-device). They can now use their own laptops, notebooks, smartphones and tablets in the office and to conduct business after hours. Now it’s time to quickly swing into action and choose the right…
Read MoreMobile Apps Cater to Our Connected World
Mobile Apps Cater to Our Connected World Used with the permission of https://thenetwork.cisco.com by Kirsten Chiala The future of mobile is faster and easier access to entertainment, shopping, and socializing. From shopping to socializing, consumers are demanding faster, and easier transactions and connections, and retailers and developers are listening. Cisco’s latest Mobile Visual Networking Index…
Read MoreWriting better business emails
Writing better business emails used with permission from HP Technology at Work The way you use language can say a lot about you. Especially in the online world, where your words are often all you have to make a lasting impression. Here are some tried-and-true tips to keep in mind when crafting business emails that…
Read More