#
Microsoft recently added a new app to its consumer plans. Learn how to use Microsoft Defender for Individuals to monitor the security of all your devices in a single dashboard.
#
Need a better way to track productivity for your in-office and remote teams? If you use Microsoft 365, then you’ll love Microsoft Productivity Score. We’ll tell you why.
Reply-chain phishing is the latest tactic used by relentless cybercriminals. Find out what this is and why it’s so dangerous to company cybersecurity.
#
Even small businesses need to have some policies for employees on things like social media use, how to secure passwords, and more. Get started by learning the 6 most important tech policies to put in place at your office.
#
Lost and stolen mobile devices are all too common. Network security can suffer a breach as a result. Find out what you should do to reduce your risk if you’ve lost your device.
#
Employees can forget their phishing training after just a few months. Use the SLAM method to help them remember how to check an email for signs of phishing.
#
Did you know that a four-month frequency is the sweet spot for employee security awareness training? Find out why and get tips on how to build a more cybersecure culture.
#
Did you know that a four-month frequency is the sweet spot for employee security awareness training? Find out why and get tips on how to build a more cybersecure culture.
#
Did you just receive a text message from yourself? This is just one of the many “Smishing” scams that are becoming more popular. Find out what’s up with this dangerous new trend.
#
Does your laptop battery hit zero charge far too soon? Here are several things you can do to reduce the power your PC is using and extend your battery life.
#
Microsoft 365 is much more than just Excel, Word, PowerPoint, and Outlook. Find out how this powerhouse platform is helping teams evolve in the new hybrid office business world.
#
Have you taken a look at Microsoft Edge lately? With features like price comparisons and automatic coupon codes, it’s becoming the preferred browser of many. Learn why.
#
Is getting your MFA code by text message or through an on-app prompt better? Is there a difference? We compare three types of multi-factor authentication to get you answers!
#
Ignore these warning signs of malware at your peril! The longer you leave an infected device untreated the more damage it can do to your system and others on the same network.
#
Does your business use mobile device management? Learn the top 5 mobile device attacks you need to watch out for.
#
Are virtual desktops a benefit over traditional hardware? We explore the pros and cons of the new Windows 365 Cloud PC.
#
Does having a second monitor really make much of a difference? Learn why you may want to consider adding another screen to your computer.
#
Many people aren’t yet as wise to social phishing as they are to email phishing. Find out six ways you can combat social phishing attacks.
#
The main cause of data breaches globally is compromised login credentials. Hackers are after your account passwords! Learn how you can prevent a breach of one of your accounts.
#
Have you been struggling with an older PC and aren’t yet ready to expense a brand-new one? We’ll tell you several of the best ways to give an older computer new life.