Microsoft To Do list All section

Quick Start – Setting up Microsoft To Do

Overview of Microsoft To Do Network People Fast Track Productivity This article will provide a brief overview of the key parts of To Do and then show you how to integrate with Microsoft Planner, Microsoft Outlook, and how to dictate tasks into your list from your devices or computer. Microsoft To Do comes with a primary …

Quick Start – Setting up Microsoft To Do Read More »

Network People President and CIO discussing vCIO Meetings

vCIO Remote Meeting Topics

Due to COVID-19, vCIO Meetings Will be Remote Network People President and CIO Discuss Remote Meeting approach and the key topics that will be covered during the COVID-19 impact. https://www.youtube.com/watch?v=YZVtmYfSiZc Key Topics Include Security Training Managing and motivating your work force best practices When having virtual meetings, having the camera on is one approach that …

vCIO Remote Meeting Topics Read More »

Lady at Computer Keyboard

How to Configure Computers to Enable Remote Work Due to COVID-19: A Technical Guide for Leaders

Setting Up Remote Access The Entire Country Just Went Into Disaster Recovery (DR) Mode. However unlike a DR situation where your office may be out of power or not accessible for a while, you should be able to keep any technical systems that are located in your office running and available.  If you have systems …

How to Configure Computers to Enable Remote Work Due to COVID-19: A Technical Guide for Leaders Read More »

You’re Facing a Cyberattack; Now What?

In today’s digital business world, hackers are after your most precious asset—your data. Companies, especially small businesses, need to stay vigilant to keep their network secure. According to MSNBC, small businesses make up 43 percent of online attack victims, and only 14 percent are prepared to defend themselves from these threats. It’s a big job, but with the help …

You’re Facing a Cyberattack; Now What? Read More »

Cyber Skull

4 Tips for Protecting Your Business from Ransomware Attacks

In today’s always-online business world, your company’s most precious resource is data. Your internal data and the personal information of your customers are vital components to the prosperity of your business. Unfortunately, cybercriminals also know this.  Today’s criminals aren’t breaking in through the window to steal your data. They’re using malicious software, known as malware, to hack into your …

4 Tips for Protecting Your Business from Ransomware Attacks Read More »

Tablet

The best tablet? Nate Freeman reviews the Apple iPad

Recently, I was asked by my Aunt to recommend the best tablet. Aunt: We are looking at buying a tablet and when I’m looking at all of the different ones, I’m blown away at how little I know. We would like a more portable “computer” but bigger than our phones that can access email, Facebook, Google info, …

The best tablet? Nate Freeman reviews the Apple iPad Read More »

Four Criticals in Four Hours

Four Criticals in Four hours is not just something that falls into place. Every employee works in tandem to ensure critical service tickets are closed as quickly and efficiently as possible. We spoke with Ryan our head dispatcher to explain to us a little about how he sets the foundation for closing these tickets. “My …

Four Criticals in Four Hours Read More »

Education is the most powerful weapon which you can use to change the world. –Nelson Mandela

With the current estimated cost of Cybercrime being over $4 billion a year, the importance of your awareness is no joke.  Keeping your assets safe starts with you – and knowing what you’re dealing with is key. I just read a few articles that really opened my eyes to the importance of understanding just how …

Education is the most powerful weapon which you can use to change the world. –Nelson Mandela Read More »