It’s the Software That Changed the Modern Economy, and We’ve All Been Using it Wrong

Financial bloggers have called it “the most important software application of all time.” Others have argued that it changed the world. Whichever side of the fence you fall on, it’s hard not to admit that Excel is one of the most powerful and versatile programs at a company’s disposal. For nearly three decades it’s been

2018-11-06T20:13:45+00:00November 6th, 2018|Systems|

Offboarding an Employee: What Happens When Someone Leaves Your Company?

Whether they’re leaving on good terms or involuntarily, an employee departure is always a precarious time for a company. The exit of someone who was once deeply involved in the day-to-day operations of your business can present a very real threat to your cybersecurity, but by developing a thorough IT offboarding policy and rigorously following

2018-10-29T21:52:26+00:00October 29th, 2018|General IT, Security|

IT Policy: How Often Should You Change Your Passwords?

Anyone who’s ever created a login has no doubt bumped up against seemingly arbitrary and annoyingly complex password composition rules. For digital citizens, one of the most frustrating hoops to jump through is the forced inclusion of special characters. But wait, not THAT special character… or that one… or that one… or that-- okay, a

2018-10-19T00:21:23+00:00October 19th, 2018|Security|

Why Is My Computer So Slow?

There are few things more infuriating than clicking on a file when you’re pressed for time, only to have to wait the span of a full commercial ad break for it to open. The seconds tick slowly by, your fingers drum against your desk, and before even the first minute passes you’re no doubt running

2018-10-12T00:28:52+00:00October 11th, 2018|Systems|

The Truth About Spam

We’re not referring to the delicious potted meat you’ve grown to love (or hate), though it’s certainly named for its ubiquity. Spam in its most loathsome form — the unsolicited, commercial email sent indiscriminately and in bulk, rarely for non-nefarious purposes — is serious business. On the Seriousness of Spam Anyone who gets spam a

2018-09-21T19:32:16+00:00September 21st, 2018|Articles, Security|

App Spotlight: PandaDoc

Have you ever thought about how long it takes you to build a quote or draft a business proposal? Like most business owners or customer relationship managers, you probably haven’t: it’s just something you do, because that’s how it is. While the length of time it takes to create business documents varies wildly industry to

2018-09-07T19:33:39+00:00September 7th, 2018|Systems|

Does your company have a “Shadow IT” department?

“Shadow IT” can be defined as IT solutions deployed within a business without the knowledge or approval of the IT department. It is put into place by employees who are looking for ways to be more productive and find going through the proper channels to get IT services approved to be cumbersome and time consuming. Employees

2018-07-10T22:56:53+00:00July 10th, 2018|Security|

“F” Is For Phishing: How To Identify The Fake, False, Fraudulent Emails Already In Your Inbox

It’s 2 AM, and you’re sound asleep. A sudden DING slaps you awake. In a sleepy haze, like a moth to a flame, you fumble for the glowing screen. A new notification floods your bedroom with light:  an email from your boss. That’s odd, she’s never awake at this hour. Your finger hovers over the

2018-06-22T23:11:12+00:00June 25th, 2018|Security|