used with permission from SBA.gov by Caron Beesley If you are starting an online business, conducting email marketing, or interacting with your customers via your website, then you need to be aware of and adhere to online privacy policies. What do online privacy policies accomplish? Why do you need one? Sometimes, it’s required, such as…

Read More

used with permission from Technology at Work Managing huge amounts of data in Excel can be painful if you don’t know how to handle it properly. These tips* will boost your effectiveness and will make you feel more confident with hundreds of rows and columns. 1. Freeze Panes Have you ever dived into the unexplored…

Read More

You may already know how to modify and create individual Quick Styles in Microsoft Word. This time, you’ll learn how to go one step further by creating and switching between sets of Quick Styles. You can make every company document look the same by reusing your own Quick Style Set! What is a Quick Style…

Read More

used with permission from Norton by Symantec Heading out of town to visit relatives during the Holidays is as traditional as turkey dinners, electronic gifts, mistletoe, and snowmen. But what many people do not look forward to is the hustle, bustle, and time-consuming activity of actually heading into, through, and out of airports. This year,…

Read More

used with permission from Norton by Symantec Phishing is an online con game, and phishers are nothing more than tech-savvy con artists. In a typical phishing scam, phishers send out emails, which appear to come from a legitimate company, in an attempt to scam users into providing private information that will be used for identity theft.…

Read More

Natassia Roman was recently promoted to Director of Operations at Mythos Technology Inc. Natassia has been with Mythos for almost 5 years and was instrumental in implementing their Professional Services Automation (PSA) ticketing system and helping to transition them to their current service model. Natassia works daily to streamline the processes and systems deployed to…

Read More

used with permission from Microsoft by Emily Warn Repeatedly entering the same information in document after document, over and over…there has to be a quicker way, right? Word macros can save you time (and potentially, some sanity) by automating repetitive tasks. Let’s say you’re a real estate agent. Every time you sell a house you have to add…

Read More

used with permission from HP Technology at Work In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes. Vendors are working to make patching easier and more trustworthy – like Microsoft and its…

Read More

used with permission from SBA.gov by Caron Beesley How secure are your small business assets from fraud, identity theft and cybercrime? According to the Association of Certified Fraud Examiners (ACFE), companies with less than 100 employees lose approximately $155,000 as a result of fraud each year. Small businesses also have a higher fraud rate than…

Read More

Used with permission from Microsoft by Michael Atalla A lot is said these days about the choices people and organizations are faced with when adopting technology. In the end, it’s all about productivity. All of these decisions are made with the aim of optimizing your productivity — whether you’re a stay-at-home mom, accountant, student, or…

Read More