Managed IT Services in Northeast Ohio
25 Mar 2015
Businesswoman with lots of reminder notes

Why Microsoft OneNote Is Indispensable

I started using OneNote as a way to get the Post-It notes off my desk.  It seemed like a simple way to store little pieces of information that didn’t belong anywhere else.  In OneNote, I could easily find and track them.  Now, I hardly ever use Post-Its (sorry, 3M).  The good news is, if you use Microsoft Office, you probably already have OneNote, so it’s easy to give it a try.

READ MORE

05 Mar 2015
save_time_and_money

8 Timesavers Using Microsoft Word

Ever wish you could easily figure out why there’s an extra space between paragraphs, change capitalizations without retyping or do a quick calculation in Word?  Here are 8 timesaving features in Word to help you do those things and more.  Here are 8 timesavers that work in Word 2010 and 2013.  Click on each tip to see a screen shot of the suggestion.

READ MORE

12 Feb 2015
Business man hand drawing a graph

How To Overcome The IT Security Poverty Line

What is the IT Security Poverty Line?  It’s the place where your business has the minimally acceptable level of security needed to fend off an “opportunistic adversary”, which is basically a hacker who takes advantages of security weaknesses in a network.  In 2014, 85% of cyberattacks were opportunistic.

READ MORE

25 Jan 2015
Hacker programing in technology enviroment with cyber icons and symbols

5 Steps To Protect Your Business From Ransomware

Your computer will not just “get infected” with ransomware, the malicious software that encrypts your files and requires a specified amount of money to unlock them.  You have to click on something or open something (perhaps unintentionally) to activate the trigger.  Last year, CryptoLocker ransomware got a lot of attention, and we’re now dealing with CryptoWall, which is a variant of CryptoLocker.

READ MORE