Articles
Tips for using Outlook Calendar
Like most people at my company, I use Outlook Calendar to remind myself and everyone else (who cares to know) when I am and am not available. Outlook Calendar is an invaluable tool if you’re in the habit of checking if someone is available first before you call them or send them a meeting invite.…
Read MorePhone ethics for business
used with permission from HP Technology at Work Cellphones are a visible symptom of our addiction to technology. We use them for everything; we can’t be separated from them and we clutch at them constantly – even obsessively. Since habits and addictions often become automatic, it’s important to do a bit of self-analysis sometimes. Our…
Read MoreProtecting Your Phone and Tablet from Loss, Theft and Attacks
used with permission from Norton by Symantec Our phones are not just phones anymore. That ‘phone’ that you use to stay in touch with people is actually a little computer (let’s call it a ‘mobile device’) containing valuable information about you, your family, your friends, and your life. Can you imagine losing your mobile device? …
Read MoreSpam, Spam, Go Away
used with permission from Norton by Symantec Spam. In some ways, it’s the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it’s also a pervasive problem that’s clogging and overwhelming the Internet’s email systems. Spam accounts for approximately 80 percent of worldwide email volume. In…
Read MoreThink before sharing your location online
used with permission by HP Technology at Work Many online alerts and notifications signal your real-life movements to the outside world. Location-based apps are trusted tools for keeping clients, colleagues and friends updated on your whereabouts. However, before you “Check in” everywhere, all the time, it is important to think about who exactly can access…
Read MoreNetwork Security Checklist
used with permission from Cisco Many small and medium-sized businesses do not have adequate network security. Here’s how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have…
Read MorePassword protect OneNote notes
used with permission from Microsoft by Dail Bridges Do you use OneNote to collaborate on a large team and want to make sure one group doesn’t see the budget? Or do you want to share a notebook with photographs from your last trip and want your friends to see all of them but not your family? …
Read MoreGet smart about security
used with permission from HP Technology at Work Congratulations, you’ve taken every step to secure data on your networks and PCs against increasingly malicious worms, Trojans and viruses. But don’t rest easy. All infrastructure elements, including printers, servers, storage, Wi-Fi networks and cloud computing are just as susceptible to surprising security threats. Forget them and…
Read MoreBusiness Continuity Tip – Cybercrime Goes Mobile
Business Continuity Tip Mobile devices have become an essential tool for everyday life. We check in for flights, make online purchases, access bank accounts, and connect to social media all on mobile-enhanced websites and newly developed applications. The worldwide adoption of the smartphone has prompted cybercriminals to shift their focus toward mobile users and away…
Read MoreFighting images in Microsoft Word
Fighting images in Microsoft Word Remember this? You’re working on a document – maybe it’s a report for your sales meeting, a set of instructions for a client, or a promotional flyer – and you are trying to place an image. You’re bumping it down a few keystrokes at a time to get it perfectly…
Read More