fbpx

Posts by TheCompuLab

OneDrive Explained Under 10 min.

 

Have you ever wonder why use OneDrive vs other products such as DropBox? or what about SharePoint? Should you use OneDrive or SharePoint?  We get this question a lot. In this video we go over OneDrive vs SharePoint and some of their differences. We also show a brief overview of how OneDrive works.  OneDrive is a cloud storage platform that works just like DropBox or G-Drive, but comes with big advantages.

Some of the benefits of using OneDrive vs Other applications:

  1. Single sign one: you only need one username and password for all the Office 365 apps.
  2. Security: same concept as single sign on, you can enable Multi-Factor Authentication (MFA) to secure all of your Office 365 apps.
  3. Ease of use: OneDrive integrates seamlessly with many of the Microsoft desktop applications like Word, Excel, Outloos and Microsoft Teams.

Watch the video to learn more!

Continue Reading
Microsoft Teams icon shown on phone screen

How Does Microsoft Teams Work?

As remote work continues as the current business norm, Microsoft Teams has become one of the most-used business tools in recent months. It had over 75 million daily users in April 2020, and it has likely gained even more in the months since.

Microsoft Teams is a collaboration app that helps professional teams stay organized and communicate remotely. It includes channels that can be used for on-the-spot meetings, to share files, and numerous other processes. If you haven’t started using it yet, here are some basics to know.

Continue Reading
man and woman look at computer together to repersent co-managed IT services

What Is Co-Managed IT, and Is It Right for Your Business?

Co-managed IT services combine internal and external IT resources in order to create a strategic partnership and close gaps in your technology.

Instead of choosing between the benefits of an in-house team and an outsourced specialist, you can get the best of both worlds under one package.

Here’s an introduction to co-managed IT services and how to tell if they’re right for your business.

Continue Reading

To Zoom or not to Zoom?

With COVID-19, videoconferencing has become a daily routine for most businesses. Anyone who has had to work from home lately understands and appreciates the importance of  communication through videoconferencing with their clients or teams, some companies even take it a step further to host social gatherings. After this pandemic, video conferencing has become a way of life for most businesses. Zoom is easy to set up, easy to operate, and provides free access to up to 100 users at a time. But there are several downsides regarding its security. The ease of use of Zoom makes “bomb” an opening in Zoom conferences, easy for troublemakers. Information-security experts say that the protection of Zoom has had several security holes.

Continue Reading
Man logging in VPN on laptop

Cybersecurity Practices Your Remote Team Should Be Following

In the first weeks and months of the COVID-19 pandemic, the World Health Organization (WHO) reported a dramatic fivefold increase in the number of cyber attacks directed at its staff. It also warned the public to beware of the rampant cyber attacks and phishing scams that attempt to take advantage of pandemic panic.

Many other businesses and organizations are facing the barrage of these increased attacks, but because of the necessity of remote work, they are confronting these cyber threats with weakened out-of-office cybersecurity measures.

So, as many businesses look to make remote work a more permanent solution, one of the most important things they need to do is to protect their digital systems, assets, and communications.

Continue Reading
remote worker types on laptop keyboard

Guide to an Effective Long-Term Remote Workforce

Due to COVID-19, many businesses have had to quickly transition their employees to remote operations.

Under normal circumstances, businesses would usually have set up explicit processes and policies before switching employees to at-home work. However, quickly changing health guidelines and lockdown measures left some businesses scrambling as many employees who were working as usual one day were quarantined at home the next.

Continue Reading

Improve Your Business With Office 365 Forms

Forms are a very common business practice for many organization, both SMBs and Enterprises. Forms can facilitate collecting data, save time, reduce mistakes and helps in creating a systematic recording of information. The problem is that they are not easy to create and once the data is collected, it is not easy to analyze.

Office 365 Forms is an easy-to-use tool that helps businesses create surveys, quizzes and polls and see results as they become available.

You can create forms in minutes, send and collect data and use their built-in analytics to evaluate responses. Forms can be private (only internal users with an Office 365 account) or public. Once the form is crated, it can be embedded in your website or simply sent in an email with a link; it even gives you the option to generate a QR code. Forms are also mobile friendly, so they can be filled out from mobile devices as well.

Office 365 Forms also gives you the option to collaborate and share this form with colleagues so that they can also make changes to the forms or use them as templates.

What is your current I.T. provider doing to make your business better?

Talk to us today and see what we can do for you!

Continue Reading

Office 365 – How to manage user accounts

We all know Office 365 is the way to go for both SMBs and Enterprises, but deciding how to manage the users and accounting for the overhead it takes, are important things to consider. Organizations will usually have an on-premise Active Directory (server) with a list of all the users, first name, last name, usernames, and most important PASSWORD.

When you create a new Office 365 account (tenant), your out of the box option is to replicate the list of users you have on-premise to the cloud, you can do this by creating one by one or by importing a list. One of the biggest headaches we face as Network Administrators is the management of these accounts, if you make one change on-premise, you have to replicate the change in Office 365, not not mention the fact that sometimes the passwords can be different from on-premise (the password you use for your computer) and for Office 365, so now users have to remember 2 passwords instead of one.

Continue Reading

5 Ways SMBs Can Save Money on Security

5 Ways SMBs Can Save Money on Security

Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise, to devote to protection. Thankfully, there are several things SMBs can do today to get more from even the most limited security budget. And, no, we aren’t talking about cutting corners. Far too often, SMBs cut the wrong corners and it ends up costing them more money in the long run. It’s a matter of taking a smarter approach to security. Here are five smart approaches to take

  • Prioritize – Every business has specific areas or assets critical to its core operations. Seek the input of valued staff and team members to determine what these are. Is there certain data that would be catastrophic if it was lost or stolen? If hackers compromise a network, or prevent access to certain applications, how disruptive would it be to daily business operations? What kind of potential threats or vulnerabilities pose the greatest risk to the company or your customers/clients? Focus on the most likely risks, not theoretical risks that “could happen.” Asking such questions gives you a clearer more complete perspective as to where to focus available security resources.
Continue Reading

Four Key Components of a Robust Security Plan Every SMB Must Know

5 Things SMBs Can Do Right Now to Preserve Their Network and Systems

Four Key Components of a Robust Security Plan Every SMB Must Know

Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances.

This makes it the responsibility of every business, especially those collecting and storing customer/client information, to implement a multipronged approach to safeguard such information.

Yes, we’re looking at you, Mr. Pizza Shop Owner who has our names, addresses, phone numbers, and credit card information stored to make future ordering easier and hassle free.

Continue Reading