How to Easily Manage Your Passwords


According to Cyber Risk Analytics, over 4.2 billion credentials were stolen in 2016. Unfortunately, breaches happen on such a large scale because people don’t follow proper password protocol. Today, we’ll teach you how to manage your passwords easily and securely, including why you should use different passwords and why you may want to use a password manager.

Passwords are like keys; each one grants access to a different room (or account). Imagine that you use the same key to get into your house and your office. Or if that key is also used to get into your car. That doesn’t seem very secure, does it? Now imagine that someone makes a copy of that key, and now a stranger has access to your house, office, and car.

This scenario may seem scary, but this is the risk you run when you use the same password for multiple accounts. And, as we’ve seen from the Cyber Risk Analytics study, this same scenario plays out billions of times per year. You and your business can avoid being a victim if you vary your passwords and use password managers.

Unpatched Vulnerabilities Exposes Businesses To Hackers


Are organizations keeping software up to date and maintaining security patches on a scheduled basis? The answer may shock you. According to Veracode’s latest research, most businesses will not patch critical security breaches after 3 full months. Reading and typing that number is a scary aspect to think about. In today’s blog post – we’ll discuss the importance of patching vulnerabilities and implementing a cyber security defense.

Should Employees Receive Cybersecurity Training?


Cybersecurity training has quickly become extremely important for businesses. Employees don’t need to be cybersecurity experts, but they should be practicing healthy cyber habits.

New-hire training and regularly scheduled refresher training courses should be established in order to instill the data security culture of your organization. As always, preparedness is the key to preventing most security breaches. It is always best to know how to avoid becoming a victim.

Three Myths About Outsourcing Computer Support


The term outsourcing has become a dirty word. For instance, consumers associate outsourcing with poor customer service. We’re here to champion the word for Managed IT Service Providers and how outsourcing is a win-win for all involved.

Outsourcing IT support to a managed IT service provider has become the norm. For instance, most businesses focus on generating revenue for the company instead of dealing with computer issues. Same can be said about services performed within a company. A business pays a municipality to maintain their water and electricity. For example, a business is paying a professional to manage all aspects of their electricity. You’re not connecting wires, installing light switches, or fixing electrical wall mounts. You’re hiring a professional to perform these tasks on your behalf. Although a business owner can maintain her own PCs or electricity, chances are she’d rather outsource these tasks to experts.

How to Share Your Calendar on Outlook


Microsoft Outlook offers many useful features to make your work life easier. Today, we’ll dive into Outlook’s calendar sharing feature, which allows users to view each others’ availability.

As an employer, you know how important it is that your employees are all on the same page. One easy way to do that is to share your Outlook calendar! Sharing your calendar lets select people know your schedule, so that they can efficiently plan meetings, projects, etc. The best part is that you decide how much information that people can see, and who sees it.

There are many customization options available to you when you share your calendar. From the Calendar Properties box, you can dictate how much information is shared and if invitees can edit your calendar. You can also revoke calendar sharing at any time. Outlook’s calendar lets you be in complete control of your schedule, so let’s get into how to access these features!