Use Windows 7’s Compatibility mode to run a troublesome older app

Use Windows 7’s Compatibility mode to run a troublesome older app To activate Compatibility mode, right-click on the affected program’s icon, then click on the Properties item in the menu that pops up. In the Properties window, you will see a set of tabs across the top; choose Compatibility. In the resulting dialog box, you will want to […]

Use Windows 7’s Compatibility mode to run a troublesome older app Read More »

Clutter vs Junk mail

Clutter vs Junk mail – Office 365 With Office 365, users have been presented with a new feature called Clutter. What is Clutter, and why is it different than the Junk Mail folder? Junk Mail is for email that is suspected to be spam, or has the characteristics of spam. Clutter on the other hand

Clutter vs Junk mail Read More »

Microsoft Auto Recover

Microsoft Auto Recover A very useful feature Microsoft added a few versions back is the AutoRecover feature. This feature is on Excel, Word, and PowerPoint, and is very useful if there is a power outage and you did not save the document. How does it work? The Auto Recover feature is turned on by default,

Microsoft Auto Recover Read More »

Help Desks play key strategic, as well as problem-solving, role

Help Desks play key strategic, as well as problem-solving, role Ask people to define “Help Desk,” and most will discuss the tactical role of resolving acute problems. But there’s a much more strategic role that a Help Desk can fulfill: Identifying issues within individual companies or with particular products and services that may merit major

Help Desks play key strategic, as well as problem-solving, role Read More »

Are You Safe?

Cybercrime costs U.S. businesses more than $300 BILLION every single year, and the threat is growing every single day. This makes business network security and computer network security more important than ever. Do you know precisely what to do to stay ahead of the criminals? Do you wonder who you can trust to help you

Are You Safe? Read More »

Reset your network password? Update your devices.

Reset your network password?  Update your devices. Password security is of the utmost importance to your organization’s network and data security.  To keep passwords secure, upon logging in, we are regularly notified that our company’s security policy requires that we create a new password.  After performing this reset, users frequently forget to update the new

Reset your network password? Update your devices. Read More »

Record that Error Message

Record that Error Message We receive frequent contact at the Help Desk with messages indicating that there has been an error event on an end-user’s PC.  These messages often read similarly to this: “I can’t open Acrobat.  It says there was an error.”  While this is certainly enough information to open an inquiry into the

Record that Error Message Read More »

How Do You Know You’re Safe? IT Infrastructure Security is Constantly Changing.

IT Infrastructure Security is Constantly Changing. Security is like insurance.  You may not want to think much about it, but if you actually need it, you are very glad you have been paying the monthly premium. When you experience a security breach, or are the victim of any type of cybercrime, things can go very

How Do You Know You’re Safe? IT Infrastructure Security is Constantly Changing. Read More »

3-2-1 Backup Rule

3-2-1 Backup Rule Hard drives will fail and, if you don’t make appropriate preparations, data can be lost. Implementing a proper backup system allows recovery of data in the event of a hardware failure. A good rule of thought for backups is the 3-2-1 backup rule. So what exactly is the 3-2-1 backup rule? Keep

3-2-1 Backup Rule Read More »

FREE – Risk Assessment

Identify your organization’s risks and receive guidance on how to mitigate those risks – FREE!

Learn more >

Scroll to Top