National Cybersecurity Awareness Month: Do Your Part – Be Cyber Smart
October is National Cybersecurity Awareness Month (NCSAM), and the theme for 2020 is – “Do Your Part. #BeCyberSmart.” NCSAM is in its 17th year and in the years since it was launched by the National Cyber Security Alliance, its mission has been to promote safe behaviors so that Americans can act…
5 Signs That It’s Time to Move to SharePoint
SharePoint is Microsoft’s file storage and sharing platform, but it can do a lot more for your business than just save your files. If you’re looking for a way to use technology to improve your business, then moving to SharePoint is the direction you should go to streamline processes, beef up security…
M365 Use Case: Streamline Onboarding Processes with Power Automate
What Can You Do with Microsoft 365? USE CASE: Microsoft Power Automate SITUATION: A company had a series of tasks that needed to be completed whenever a new hire was onboarded. These tasks included activities in different departments. For example, HR gathered employee information; Accounting…
Microsoft 365 Use Case: Message with Teams Instead of Text Messaging
What Can You Do with Microsoft 365? USE CASE: Microsoft Teams SITUATION: A company needed to record incoming shipments of supplies at various job locations. The onsite employees were using their personal cell phones to take photos of the shipments and were sending those via text messaging to…
3 Reasons Why You Need Policies to Communicate Security Expectations to Your Remote Workforce
If you’re relying on unspoken or informal standards to communicate security expectations to your remote workforce, then you can expect to have some confusion and gaps in the way your company is managing cybersecurity. Documented security policies are what you need to inform employees about acceptable…
Lack of Security Policies = Cybersecurity Red Flag
If you need to follow regulatory compliance for protecting information, you probably already know that a good chunk of your cybersecurity strategy is in deciding how you’re going to control access to information with security policies. The creation of security policies, however, is important for any business…