Articles
Excel tips for handling lots of data
used with permission from Technology at Work Managing huge amounts of data in Excel can be painful if you don’t know how to handle it properly. These tips* will boost your effectiveness and will make you feel more confident with hundreds of rows and columns. 1. Freeze Panes Have you ever dived into the unexplored…
Read MoreStreamline your company's documents with Word's Quick Style Sets
You may already know how to modify and create individual Quick Styles in Microsoft Word. This time, you’ll learn how to go one step further by creating and switching between sets of Quick Styles. You can make every company document look the same by reusing your own Quick Style Set! What is a Quick Style…
Read MoreSafely Using Airport Wi-Fi
used with permission from Norton by Symantec Heading out of town to visit relatives during the Holidays is as traditional as turkey dinners, electronic gifts, mistletoe, and snowmen. But what many people do not look forward to is the hustle, bustle, and time-consuming activity of actually heading into, through, and out of airports. This year,…
Read MoreHow to Protect Against Phishing
used with permission from Norton by Symantec Phishing is an online con game, and phishers are nothing more than tech-savvy con artists. In a typical phishing scam, phishers send out emails, which appear to come from a legitimate company, in an attempt to scam users into providing private information that will be used for identity theft.…
Read MoreAvoid repeating yourself: Create a Word macro
used with permission from Microsoft by Emily Warn Repeatedly entering the same information in document after document, over and over…there has to be a quicker way, right? Word macros can save you time (and potentially, some sanity) by automating repetitive tasks. Let’s say you’re a real estate agent. Every time you sell a house you have to add…
Read MorePatch right and keep hackers out
used with permission from HP Technology at Work In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes. Vendors are working to make patching easier and more trustworthy – like Microsoft and its…
Read More7 Ways to Protect Your Small Business from Fraud and Cybercrime
used with permission from SBA.gov by Caron Beesley How secure are your small business assets from fraud, identity theft and cybercrime? According to the Association of Certified Fraud Examiners (ACFE), companies with less than 100 employees lose approximately $155,000 as a result of fraud each year. Small businesses also have a higher fraud rate than…
Read MoreWith Office 365, there’s no reason to compromise
Used with permission from Microsoft by Michael Atalla A lot is said these days about the choices people and organizations are faced with when adopting technology. In the end, it’s all about productivity. All of these decisions are made with the aim of optimizing your productivity — whether you’re a stay-at-home mom, accountant, student, or…
Read MoreOnline Fraud and Identity Theft
used with permission from Norton by Symantec Online fraud is a type of cybercrime that uses email, web sites, chat rooms or message boards. There are many different types of online fraud, including phishing and pharming scams, which use forged e-mails and Web sites to trick recipients into giving out personal information such as credit…
Read MoreAdvance Preparation for Disaster is a Must for Every Small Business
used with permission from Norton by Symantec by Marian Merritt Small businesses are the economic backbone of this country. Yet, in the aftermath of manmade or natural disasters, an astounding 40% of small businesses never reopen. It doesn’t have to be this way; with preparation, organization and practice, owners and employees of small businesses can…
Read More