Blog

Microsoft Outlook: FindTime With Colleagues

Everything You Need to Know About Operating and Using FindTime Scheduling meetings seems like it should be an easy task. However, anyone who does business knows with everyone’s busy schedules how difficult it can be to find a time that works for everyone who needs to attend. FindTime is an Outlook add-in that can help…

Read More
Share

Microsoft Teams Options Improve Remote Presentations

Microsoft Teams Options Improve Remote Presentations Until the recent rollout of Microsoft Teams background customization feature, videoconferencing was a sometimes less-then-enviable communication vehicle. Users would have to tidy up the workspace, scrunch the camera to only capture their face or suffer that “lived-in” looking home office or kitchen table in the background. Aside from having…

Read More
Share

What You Need to Do to Protect Your Team From Coronavirus Phishing

How to Protect Your Business From the Surge in Phishing Websites Look at the spike in phishing websites during the coronavirus. Learn how cybercriminals are leveraging the pandemic. Find out how to protect your business.   As the entire world is worrying about the coronavirus, cybercriminals are taking advantage of the global crisis to line…

Read More
Share

What You Need to Do to Protect Your Team From Coronavirus Phishing

How to Protect Your Business From the Surge in Phishing Websites Look at the spike in phishing websites during the coronavirus. Learn how cybercriminals are leveraging the pandemic. Find out how to protect your business.   As the entire world is worrying about the coronavirus, cybercriminals are taking advantage of the global crisis to line…

Read More
Share

Hackers Target Zoom Meetings for Cyberattacks

Zoom Scrambles to Address Cybersecurity Issues in Meeting Platform As the usage of Zoom has skyrocketed during the coronavirus outbreak, the company has had to respond quickly to security flaws and potential phishing attacks   As Zoom usage skyrockets around the world, so too do the opportunities to exploit users unfamiliar with the tool. The…

Read More
Share