Month: March 2018

  • Whole Group

    Whole Group

    Tom Bowles, Alltek CEO, leading a workshop on leveraging the cloud for your business. He discussed the Pros and Cons to many of the most prominent cloud products. We help businesses decide whether an on-premise, cloud-based, or hybrid environment is best for their business. This was a great event hosted by Central Florida SCORE at…

  • Why 2 factor Authentication?

    Cyber criminals are trying to directly access your device or system using phishing attacks, Trojans or ransomware, to attacking web applications like Microsoft Office 365.

  • Protect Office 365 Data with Multi-Factor Authentication

    Protect Office 365 Data with Multi-Factor Authentication

    You probably know that cybercriminals are using more sophisticated methods to steal your confidential information.  They’ve adjusted their hacks from trying to directly access your device or system using phishing attacks, Trojans or ransomware, to attacking web applications like Microsoft Office 365.

  • New Data Breach Laws Mean More Trouble When You Get Hacked

    New Data Breach Laws Mean More Trouble When You Get Hacked

    The recent surge in cyber theft and hacking has everyone worried. With each new cyber breach, consumers realize just how vulnerable we all are. After the Equifax hack of September 2017, state legislatures began proposing new laws that would tighten data security. For those working with an MSP, the burden often falls on them to…

  • Tired Of Amateur Hour? Learn How To Use Excel Like A Pro

    With the 2016 version of Excel, Microsoft has really upped the game for people who aren’t great with numbers. You can now easily use one-click access that can be customized to provide the functionality you need.

  • Will The (Cloud) Storage Wars Draw Blood?

    Will The (Cloud) Storage Wars Draw Blood?

    Modern professional relationships require digital processes, like email, collaborative software, and file sharing. The cloud has opened up incredible possibilities beyond imagination a mere decade ago, but which is the right choice? The competition is seriously fierce in cloud storage. The Internet of Things has fueled a data addiction for which traditional storage can’t physically…

  • Having Problems with Two-Factor Authentication for Office 365?

    Having Problems with Two-Factor Authentication for Office 365?

    We noticed that some people are having problems using Microsoft Office 365 with two-factor authentication (2FA) (also known as multi-factor authentication). We have a few tips for you here. First: It’s important to know that when your admin sets up 2FA for your Office 365 users, they must enable Modern Authentication (MA) for Exchange Online…

  • Is Your Business Hemorrhaging Money?

    Is Your Business Hemorrhaging Money?

    Hint: It Will If Your IT Network Goes Down. You’re lying in bed, almost asleep when, “Oh no! Another lightning strike -that means the power probably went out in the office!” Does the sound of thunder keep you awake at night wondering if your IT network will be up and running the next morning? It…

  • Tired Of Amateur Hour? Learn How To Use Excel Like A Pro

    Tired Of Amateur Hour? Learn How To Use Excel Like A Pro

    With the 2016 version of Excel, Microsoft has really upped the game for people who aren’t great with numbers. You can now easily use one-click access that can be customized to provide the functionality you need. This is the first of a three-part series about using Microsoft Excel 2016 to help you identify trends, construct…

  • Agony! My Phone Got Hacked at a Football Game!

    Agony! My Phone Got Hacked at a Football Game!

    My family loves our local football team. We’ve been die-hard fans since we were children.  And as season ticket holders, we rarely miss any home games.  However, the last game was a nightmare for me.  Not because my team played poorly, but because my phone got hacked. I used the public Wi-Fi at the stadium…