IT Trends for 2016 Presentation

Thanks to everyone who joined us in person and online for our IT Trends for 2016 presentation on Wednesday! We hope you had a great time and learned a lot. If you weren’t able to join us live, you can find a copy of Bob’s presentation attached to this blog article.

Think Your Business is Too Small to Get Hacked? Think Again!

b2ap3_thumbnail_hacked_pc_400.jpgMost computer users should practice the policy of ensuring optimal security on their PCs. To this end, assuming that you’ll be hacked (or at least targeted) at some point is pretty reasonable, as it allows you to plan ahead and take preventative actions. Still, there are plenty of people in the world who don’t care enough or worry enough to make security-minded decisions. Contrary to popular belief, there are countless ways that a hacker can take advantage of a hacked PC.

Project Estimates, Actuals, and Variances – Get to know them!

One way to track the health of your project is by monitoring the difference between what you planned to do and what you actually did, also known as planned vs actual. Prior to starting a project, we spend some time planning it (at least we should). One of the things that takes place during project planning is determining which tasks need to be done, and how long they will take.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

What's New in PowerPoint 2016

PowerPoint got a little updating for the 2016 version, here are a new features that you might find helpful.

Tell Me – We have mentioned this in the other Office applications, it works the same way in PowerPoint. Type in what you want to do, and Tell Me takes you to the appropriate function.

The Top 5 Cloud Security Issues You Need to Look Out For In 2016

b2ap3_thumbnail_security_cloud_400.jpgSecurity is a huge problem for businesses that take advantage of the cloud, but never to the same degree. It’s often the nature of the industry which dictates how much a business should invest in cloud security. However, despite these differences in policy, there are some aspects of cloud security that absolutely can’t be overlooked, including data permissions, account security, vulnerability to malware, and other online issues.

What’s wrong with this (LinkedIn) picture?

What’s Wrong With This Picture?

Or "How I decided (after being beaten about the face and neck) to retire my existing LinkedIn picture because my existing LinkedIn picture was doing exactly what I wanted it to do."

This week I joined about 25 or so other Microsoft Cloud Champion Partners to review some new marketing tools developed by Robin Robins (www.

Windows 8 Users Will No Longer Receive Patches and Security Updates

b2ap3_thumbnail_windows_8_done_400.jpgIf you’re one of the unfortunate souls still using Windows 8 (as opposed to 8.1) on your business’s workstations, you should consider upgrading, and as soon as possible. Microsoft has cut off support for its infant operating system, so if you want patches, security updates, and just a better overall operating system, upgrading to Windows 8.1 or 10 is an ideal solution to this dilemma.