The New cybersecurity Executive order- and what that means for you, a consumer of technology.

In light of the recent ransomware attacks, SMB may wonder how cybercrime could impact their company and whether they are protected against such attacks. This blog will briefly review the recent cyber-attack on the Colonial Pipeline, what the recent Executive Order means, and how you can protect YOUR company by implementing the best security practices.

Read More
Ransomware Myths and what you should do to protect your company from attacks!

In this blog we are taking a look at Webroot’s recent article, “3 Ransomware Myths Businesses Need to Stop Believing ASAP,” and what Infotect recommends to be proactive not only reactive when dealing with malicious Ransomware. You probably have heard a lot about ransomware lately, in this blog you will learn what is myth, the truth, and whether your vunrabile.

Read More
5 Tools that come with your Microsoft Enterprise License that you've never heard of!

Microsoft developed these suite of tools with you, the end-user in mind. You might not know all of the tools that come with the Microsoft Enterprise License and how valuable they can be to your company's productivity. In this blog, Infotect goes over their top 5 tools that are included with the Microsoft Enterprise License. Do you know them all?

Read More
How to Convert Your Google Calendar Events To Microsoft Excel

Using a calendar to track and organize life is a great tool. Google’s calendar is very flexible with multiple calendars, repeat events, reminders, and more. In the blog below, you can follow my steps to get your calendar and create an Excel spreadsheet. Then, take the macro and insert the code provided for the function and subroutine. You can feel free to customize and optimize from there! Enjoy!

Read More
Security Do’s and Don'ts: The work from home edition

Time and time again our tech experts see the same security mistakes made by end-users, making not only the user’s PC vulnerable, but now their company is at risk of a serious breach. And while everyone makes these mistakes, it is critical for the stakeholders of the business to set the right precedence of what your company’s security policies should look like. In this blog, we will give a refresh of our security do’s and don’ts, work from home edition.

Read More