Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
    • Managed Cybersecurity for Microsoft 365
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Download Remote Support Tool
  • Hire Us

Zoom-Bombing is the Newest Online Threat. Learn How to Keep Video Meetings Private

May 20, 2020 by Glen Michaelson

Zoom-Bombing is the Newest Online Threat. Learn How to Keep Video Meetings Private

Video conferencing has become the new way to have a “face-to-face” during the coronavirus lockdown, which has impacted businesses in Nampa ID and the rest of the world. [Read more…]

Filed Under: Blog Post

Share:

How to Improve Your Home or Office Wi-Fi Performance by Upgrading to a Mesh Network

May 13, 2020 by Glen Michaelson

How to Improve Your Home or Office Wi-Fi Performance by Upgrading to a Mesh Network

Few things are more frustrating in a digital world than having trouble with your Wi-Fi performance. [Read more…]

Filed Under: Blog Post

Share:

7 Helpful Tips to Look Professional When You Video Conference from Home

May 6, 2020 by Glen Michaelson

7 Helpful Tips to Look Professional When You Video Conference from Home

Have you noticed when you see people connecting to video calls from home, they sometimes look at little different? Less professional? [Read more…]

Filed Under: Blog Post

Share:

Did You Know Microsoft Teams Can Improve Document Security?

April 29, 2020 by Glen Michaelson

Did You Know Microsoft Teams Can Improve Document Security?

COVID-19 has changed the way that many businesses operate. This includes the realization that they need cloud applications that can keep people connected to their work and each other, no matter what. [Read more…]

Filed Under: Blog Post

Share:

How Financial Firms Can Boost Compliance Using MS Teams Information Barriers

April 15, 2020 by Glen Michaelson

How Financial Firms Can Boost Compliance Using MS

Many financial regulations have to do with protecting information and preventing disclosure to unauthorized parties. While this is generally thought of as controlling disclosure from those outside an organization, it can also include prohibiting data leakage within a company. [Read more…]

Filed Under: Blog Post

Share:

Home Technology COVID-19 Survival Kit

April 8, 2020 by Glen Michaelson

Home Technology COVID-19 Survival Kit

Many families in Idaho and throughout the country are adjusting to the new “temporary normal,” which is staying home and depending more than ever on stocked supplies and their internet connection and electronics. [Read more…]

Filed Under: Blog Post

Share:

How to Use Office 365 Sensitivity Labels to Automate Secure Document Handling

April 1, 2020 by Glen Michaelson

How to Use Office 365 Sensitivity Labels to Automate Secure Document Handling

An employee accidentally shares a OneDrive folder link instead of document link with a client and that folder contains unprotected, sensitive company files. [Read more…]

Filed Under: Blog Post

Share:

Stay Alert and Avoid These New Coronavirus Phishing Scams

March 25, 2020 by Glen Michaelson

Stay Alert and Avoid These New Coronavirus Phishing Scams

It’s a shame that in the midst of a global pandemic, scammers are looking for ways to capitalize on everyone’s fears for their own personal profit. But unfortunately, the hackers look for any opportunity they can get, and the newest one is the Coronavirus (COVID-19). [Read more…]

Filed Under: Blog Post

Share:

6 Important Reasons You Should Back Up Your Cloud Services

March 18, 2020 by Glen Michaelson

6 Important Reasons You Should Back Up Your Cloud Services

Does your office back up their cloud services or do they use cloud services as a backup for company files? [Read more…]

Filed Under: Blog Post

Share:

Spend Less Time in Your Inbox with these 5 Outlook Tricks

March 11, 2020 by Glen Michaelson

Spend Less Time in Your Inbox with these 5 Outlook Tricks

After working on role-specific tasks, email is the next biggest time consumer in company offices. Workers spend approximately 28% of their time sorting, reading, and responding to emails, which equates to over a week each month for a 40-hour/week schedule. [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 21
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2025 · Connect2geek.com