Latest & Greatest Post

Webinar: Are You Cybersecurity Ready?

Read More
Avatar photo
Bill Bowman
Most Recent

Add a Date Picker to your Word Document

To add a Date Picker (a clickable calendar) to your document, from the Developer tab, click the Date Picker Content Control in the Controls group. If the Developer tab is not displayed in the Ribbon, turn it on by clicking File, Options, Customize Ribb
Jess Watters
Jessica Watters
>>Read More

Create AutoText for Frequent Responses in Outlook

Find the “model text” that you want to use as the AutoText entry and copy it into your Windows clipboard (CTRL+C) (this could be a frequent paragraph or short phrase that you type often in numerous responses. Draft a new email and paste it into the bod
Jess Watters
Jessica Watters
>>Read More

Airiam Launches New Website and Logo for Bluewater Management Group

Airiam,  announced that they have recently a new website and logo for Bluewater Management Group (bluewatergrp.com), a woman-owned small business born from a military family based in Norfolk, Virginia. The rebranding includes a new simplified logo and
Jess Watters
Jessica Watters
>>Read More

Microsoft Teams is Replacing Skype for Business

You may have heard of Skype, Microsoft’s tool within Office 365 for instant messaging and conferencing. You may even use it in your business today. It is a great tool to communicate and collaborate with people inside and outside of your organization. A
Jess Watters
Jessica Watters
>>Read More

Adding an Exchange Email Account to your Android Phone

Below are the instructions for adding your Exchange Email Account to your Android Phone. If you have any questions or problems, please contact us. Touch Apps. Touch Settings. Scroll to and touch Accounts. Touch Add Account. Touch Microsoft Exchange Act
Jess Watters
Jessica Watters
>>Read More

We Hired a Hacker

Hiring a Hacker Security is not an option anymore. While operations in many IT organizations went against security (1)(2) for years, it is now obvious that security needs to be at the beginning of every process. A hacker is a serious threat. Threats ar
Avatar photo
Anthony Lewis
>>Read More

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.