 
            Eden Reid
Filter by
 
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  2 min read
                              
                              How to Use Microsoft Find Time and Scheduling Assistant
                                  I love efficiency and hate wasting time while waiting for peoples responses. When I discovered Outlooks Scheduling Ass...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  4 min read
                              
                              5 Data Backup Statistics That Should Concern Municipalities
                                  Most municipalities would admit they need to back up their data. Thankfully, we find that municipalities usually have so...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 min read
                              
                              Email Vigilance Critical to Combat Phishing Attacks
                                  Start by hovering over the link in the email. When you hover your mouse over a link (but dont click on it), it brings u...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  3 min read
                              
                              Technology in Your Business is a Boardroom Discussion: Why IT Needs Strateg...
                                  Information technology is a vital part of every organization. As the world of work grows increasingly digital, IT has be...
                              
                              
                              Read More
                           
                
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  2 min read
                              
                              Business Continuity Checklist
                                  By reviewing and addressing the questions below, your business will be better prepared for unexpected events and disrupt...
                              
                              
                              Read More
                          
                                  
                                    
                                 
                                    
                                    
                                     Blog
                                       |  
                                    
                                    
                                      
                                  1 min read
                              
                              How To: Manage Security Risks When Connecting to Your Work Network From Hom...
                                  The overriding risk of remote access services and software is a hacker gaining deeper access to your organization, expos...
                              
                              
                              Read More