Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
    • Managed Cybersecurity for Microsoft 365
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Download Remote Support Tool
  • Hire Us

Several New Enhancements Are Coming to Microsoft 365 This Year

June 29, 2022 by Glen Michaelson

Several New Enhancements Are Coming to Microsoft 365 This Year

Approximately 63% of high-growth companies use a “productivity anywhere” hybrid work approach. To pull this off effectively requires the right cloud tools that allow collaboration and access from anywhere on any device. [Read more…]

Filed Under: Blog Post

Share:

5 Best Practices for Setting Up a Sustainable Hybrid Office

June 22, 2022 by Glen Michaelson

5 Best Practices for Setting Up a Sustainable Hybrid Office

The makeshift work-from-home situations that companies put in place in 2020 when the pandemic first hit, were initially meant to be temporary for many. But two years later, the business world has realized remote work and hybrid offices are here to stay. [Read more…]

Filed Under: Blog Post

Share:

What is Reply-Chain Phishing & Why Is it Dangerous?

June 15, 2022 by Glen Michaelson

What is Reply-Chain Phishing & Why Is it Dangerous?

Email-based phishing attacks are one of the biggest threats that companies face. Just one wrong link clicked by a fooled employee can lead to a devastating ransomware infection or account takeover. [Read more…]

Filed Under: Blog Post

Share:

Steps Employees Should Take If Their Work Laptop or Smartphone is Lost/Stolen

June 8, 2022 by Glen Michaelson

Steps Employees Should Take If Their Work Laptop or Smartphone is Lost:Stolen

Sixty percent of the endpoints in the average company are mobile devices. Employees work much differently today than a decade or two ago. They’re often working from home and when traveling. Laptops, tablets, and smartphones make this possible. [Read more…]

Filed Under: Blog Post

Share:

Remote Team Security Tip: Put IoT Devices on their Own Wi-Fi Network

May 25, 2022 by Glen Michaelson

Remote Team Security Tip: Put IoT Devices on their Own Wi-Fi Network

Most companies have now settled into the flow of having remote workers. Since the pandemic, remote work and hybrid teams have become the new normal. But when it comes to cybersecurity, companies are still figuring a few things out. [Read more…]

Filed Under: Blog Post

Share:

7 Important Ways to Prevent a Cloud Data Ransomware Infection

May 18, 2022 by Glen Michaelson

7 Important Ways to Prevent a Cloud Data Ransomware Infection

Ransomware can strike data no matter where it resides. On employee devices, company servers, and in cloud storage and SaaS (Software as a Service) platforms. [Read more…]

Filed Under: Blog Post

Share:

What Is the Best Training Interval for Employee Security Awareness Training?

May 11, 2022 by Glen Michaelson

What Is the Best Training Interval for Employee Security Awareness Training?

Any strong, reliable company cybersecurity strategy will include layers of different types of protection. Including device protections, network security, and cloud-based security. One protection that is just as important as all the others is employee security awareness. [Read more…]

Filed Under: Blog Post

Share:

SMS Phishing (Smishing) Is On the Rise! Here’s What to Look Out For

May 4, 2022 by Glen Michaelson

SMS Phishing (Smishing) Is One the Rise! Here's What to Look Out For

Most people are aware that they will get phishing emails in their inboxes. Email scams have been around for decades now, and people often will pause before they interact with an email that looks in any way suspicious. [Read more…]

Filed Under: Blog Post

Share:

Learn About the Microsoft Power Platform & How It Can Take You to the Next Digital Level

April 27, 2022 by Glen Michaelson

Learn About the Microsoft Power Platform & How It Can Take You to the Next Digital Level

In today’s world, often what makes one business stand out from its competitors is how well it can leverage technology. This has benefits both for company productivity and for the customer experience it provides. [Read more…]

Filed Under: Blog Post

Share:

Biggest Threats to Mobile Device Security You Need to Watch Out For

April 20, 2022 by Glen Michaelson

Biggest Threats to Mobile Device Security You Need to Watch Out For

How often do you use your mobile phone instead of a computer for things like checking email? Accessing social media? Checking in on your company’s team messaging app? [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 21
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2025 · Connect2geek.com