Blog

Communication before the storm is key

As it is only a matter of time before the first winter storms hit in many places, you might want to consider taking a look at your company’s business continuity plan. Each year heavy snowfall and other weather-related incidents interrupt services and cost businesses money.

Office 2016 for Mac is now available for Office 365 Mac users

Welcome to the new Office for Mac!

Unmistakably Office, designed for Mac. Do your best work—anywhere, anytime and with anyone.

See what's new

Unmistakably Office, designed for Mac

Get started quickly with new, modern versions of Word, Excel, PowerPoint, Outlook and OneNote—combining the familiarity of Office and the unique Mac features you love.

Ransomware

The war against malware is a never-ending battle. One of the most vicious types of malware is often referred to as “Ransomware”. Ransomware encrypts your files and/or hard drive and completely disables your ability to access your files unless you pay the ransom to unencrypt your data.

WiFi Security

As you are aware, we are all at risk for our business and personal networks and accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves. Over the next number of months and years Imagine IT will make recommendations to continually harden network and data security for our Partners.

Social Engineering Attacks

As you are aware, scammers use many methods to try to obtain your confidential personal and business information. Since firewalls, antivirus software, and passwords are better than ever at protecting your data, the scammers are now using “social engineering” as a way to get around your core security technologies.

Portable Device Security

As you are aware, we are all at risk for our business and personal networks and accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves. Over the next number of months and years Imagine IT will make recommendations to continually harden network and data security for our Partners.

How to start using OneNote

OneNote is slowly gaining popularity.

But I noticed a problem.People like it – they want to use it – but the EXACT steps of starting to use OneNote are not clear. So here are the OneNote Start Guidelines. Click here to read more

Image source: OneNoteSource: Efficiency 365

Password Management Systems

As you are aware, we are all at risk for our business and personal networks and accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves. Over the next number of months and years Imagine IT will make recommendations to continually harden network and data security for our Partners.

Two-Step Authentication

As you are aware, we are all at risk for our business and personal accounts being hacked, whether it be passwords, credit card info, or information that would help identity thieves.

Part of the Solution:

Two-Step Authentication (sometimes called “two-factor” or “multi-factor”). Two-step makes it exponentially more difficult for a hacker to gain access to your accounts.