Should My Employees Receive Cybersecurity Training?


Cybersecurity training has quickly become extremely important for businesses. Employees don’t need to be cybersecurity experts, but they should be practicing healthy cyber habits.

New-hire training and regularly scheduled refresher training courses should be established in order to instill the data security culture of your organization. As always, preparedness is the key to preventing most security breaches. It is always best to know how to avoid becoming a victim.

How to Share Your Calendar on Outlook


Microsoft Outlook offers many useful features to make your work life easier. Today, we’ll dive into Outlook’s calendar sharing feature, which allows users to view each others’ availability.

As an employer, you know how important it is that your employees are all on the same page. One easy way to do that is to share your Outlook calendar! Sharing your calendar lets select people know your schedule, so that they can efficiently plan meetings, projects, etc. The best part is that you decide how much information that people can see, and who sees it.

There are many customization options available to you when you share your calendar. From the Calendar Properties box, you can dictate how much information is shared and if invitees can edit your calendar. You can also revoke calendar sharing at any time. Outlook’s calendar lets you be in complete control of your schedule, so let’s get into how to access these features!

Why It’s Important To Assign User Rights


Handing the keys of a Ferrari to an 18 year old kid is ultimately a bad idea. The same concept can be said about providing all company employees administrative rights. The importance of user permissions is a critical business factor. One that may cost a business lots of money if not properly implemented. We’ll explain.

What Are User Rights?

PC Mag defines user rights as the authorization given to users (company employees) that enables them to access specific resources on the network, such as data files, applications, printers and scanners. There are numerous types of user roles. For example, a person can be a standard user, guest user, or administrator. These are only a handful of the type of roles company users can be. Typically, most company employees will fall under the category of standard users. These individuals can perform day-to-day tasks dedicated to their specific job role without needing higher level user rights. An employee with higher rights can wreak havoc on a computer, or worse, on a company network. The last issue a business wants to experience is an employee’s PC being infiltrated by ransomware.

How To Spot A Phishing Email


Phishing emails are the most common way for criminals to distribute malicious software or obtain sensitive information. Is your business safe from these attacks? We have some tips that you can follow to make sure your business doesn’t become a victim!

In a previous post, we gave you the top 3 email security tips for your business. Unfortunately, phishing emails are a more common occurrence now than ever before. According to Symantic, the average user may receive on average 16 phishing emails per month. With so many avenues of attack available to phishers, businesses should prioritize their security standards to make sure that they mitigate the risk of a compromised system.