Clutter vs Junk mail

Clutter vs Junk mail - Office 365 With Office 365, users have been presented with a new feature called Clutter. What is Clutter, and why is it different than the Junk Mail folder? Junk Mail is for email that is suspected to be spam, or has the characteristics of spam. Clutter on the other hand

By |May 25th, 2016|Categories: Tech Tips|Comments Off on Clutter vs Junk mail

Microsoft Auto Recover

Microsoft Auto Recover A very useful feature Microsoft added a few versions back is the AutoRecover feature. This feature is on Excel, Word, and PowerPoint, and is very useful if there is a power outage and you did not save the document. How does it work? The Auto Recover feature is turned on by default,

By |May 25th, 2016|Categories: Tech Tips, Tips & Tricks|Comments Off on Microsoft Auto Recover

Reset your network password? Update your devices.

Reset your network password?  Update your devices. Password security is of the utmost importance to your organization’s network and data security.  To keep passwords secure, upon logging in, we are regularly notified that our company’s security policy requires that we create a new password.  After performing this reset, users frequently forget to update the new

By |February 23rd, 2016|Categories: Tech Tips|Comments Off on Reset your network password? Update your devices.

Record that Error Message

Record that Error Message We receive frequent contact at the Help Desk with messages indicating that there has been an error event on an end-user’s PC.  These messages often read similarly to this: “I can’t open Acrobat.  It says there was an error.”  While this is certainly enough information to open an inquiry into the

By |February 23rd, 2016|Categories: Tech Tips|Comments Off on Record that Error Message

3-2-1 Backup Rule

3-2-1 Backup Rule Hard drives will fail and, if you don’t make appropriate preparations, data can be lost. Implementing a proper backup system allows recovery of data in the event of a hardware failure. A good rule of thought for backups is the 3-2-1 backup rule. So what exactly is the 3-2-1 backup rule? Keep

By |December 14th, 2015|Categories: Tech Tips|Comments Off on 3-2-1 Backup Rule

Microsoft Windows Problem Steps Recorder

Microsoft Windows Problem Steps Recorder How to Use Microsoft Steps Recorder: Search for "Steps" in the Start Menu Select "Record Steps to Reproduce a Problem" Launch Application Click "Start Record" Record Process When finished click "Stop Record" Have you ever tried to describe a Microsoft Windows-based task to a colleague or friend, such as how

By |December 14th, 2015|Categories: Tech Tips|Comments Off on Microsoft Windows Problem Steps Recorder

Office and the iPad Pro Get Along Better Than You Think

Office and the iPad Pro Get Along Better Than You Think Office works with the iPad Pro, iOS 9 and WatchOS 2. We’ve developed a number of new features for Word, Excel, PowerPoint, OneNote, Outlook and Translator to take advantage of these enhancements. Read up on the official Office Blog to learn about multitasking, inking,

By |November 16th, 2015|Categories: Tech Tips|Comments Off on Office and the iPad Pro Get Along Better Than You Think

Taking a screen shot

Taking a screen shot How do I take a screen shot in Windows or Mac? Taking a screen shot can be helpful when trying to troubleshoot a problem.  Error codes can be copied and sent in to assist in resolving the issue. In Windows, press the Print Screen (PrtScn) button on the keyboard.  Then you

By |November 16th, 2015|Categories: Tech Tips|Comments Off on Taking a screen shot

Fraudulent emails that are targeting businesses and non-profit organizations

Fraudulent emails that are targeting businesses and non-profit organizations There has been a recent uptick in fraudulent emails targeting businesses and non-profit organizations. The perpetrators send emails posing as a leader in the organization, usually a CEO or Executive Director, to someone in the financial department of the organization requesting a wire transfer of some

By |October 15th, 2015|Categories: Tech Tips|Comments Off on Fraudulent emails that are targeting businesses and non-profit organizations

Things to consider for security and safety

Things to consider for computer security and safety Never give out login credentials (over the phone, in person,or by email). When using public Wi-Fi, refrain from sending or receiving private information. Report any loss or theft of your company issued smartphone/tablet/laptop immediately to IT. Choose strong password with letters, numbers, and special characters to create a

By |September 9th, 2015|Categories: Tech Tips|Comments Off on Things to consider for security and safety