Section 179 Tax Savings on Computer Equipment and COVID-19 Work Environment Modifications
If you had to buy extra laptops and equipment for your employees to work from home because of the COVID-19 pandemic, this might be your year to take advantage of accelerated depreciation allowed by Section 179 of the IRS Tax Code. Not only should you look back through the past months to see what you…
M365 Use Case: Get Organized, Save Time and Stay on Track with Microsoft Planner
What Can You Do with Microsoft 365? USE CASE: Microsoft Planner SITUATION: With less than 50 employees, our company is quite small, and many people wear more than one hat. For example, the person who oversees Marketing is also a Product Manager and plays a role in Business Development. For each of the…
Why Cheap IT is a Really Bad Idea
No one wants to overpay for IT, but it’s very possible that you’re sabotaging your business if you’re trying to keep costs low by under-investing in IT. The word “investment” is key here, because if you don’t spend the dollars up front, you’re going to end up spending them down the road…
M365 Use Case: Collect, Analyze and Share Information with Microsoft Forms
What Can You Do with Microsoft 365? USE CASE: Microsoft Forms SITUATION: As an IT company, we have a lot of requests coming in for new computer equipment. Different roles within a company have unique hardware and software combinations that have been determined to best meet their needs. For…
Lessons Learned from a True Story of How a Phishing Email and Look-Alike Domain Netted $160,000 for a Hacker
What if you got a call from your vendor asking you why you haven’t paid them yet – but you HAD already paid them, or you thought you had. That’s what happened recently to a company that became the victim of a cyber attack that siphoned off $160,000 to the hacker’s bank. Here’s how it happened…
4 Ways to Mitigate the Dangers of Your Home Network
How “smart” is your home? Could you list everything under your roof that’s connected to the internet? Let’s start that list – computers, tablets, smartphones, TV, thermostat, speakers, game consoles, hearing aids… you get the idea. These are all endpoints that can create potential vulnerabilities…