Tech Tip Tuesday:

Put your USB drive in the right way the first time 

Plugging in a USB cable the right way feels like a no-brainer. Then why do we get it wrong on the first try so often? 

Here’s the secret: Grab any USB cable sitting around your house. See that symbol on one side? It’s not just branding or decoration. That symbol will point up if you’re plugging in horizontally and if you’re plugging a cable vertically, the USB symbol will face you. Now you know. 

Tech Tip Tuesday:

What to Do with Malicious Spam (Email) 

This type of spam should be treated seriously, as it could lead to your computer and network being compromised. If you receive an email from someone who is NOT a legitimate sender that you recognize or someone you previously worked with, take the following steps:  

  1. DO NOT click on the any URLs, attachments, links, or contents within the email.  
  2. Forward the email to your company’s system admin or security officer.  
  3. Delete the email from your mailbox.  
  4. If you are using Outlook, mark the email as Junk.  

Tech Tip Tuesday:

primarily focusing on how useful it is for hosting and storing data. However, this isn’t the only thing the cloud can do. Cloud technology enables today’s businesses to make use of tools that would ordinarily be out of reach. Yes, its storage capabilities can help make data more accessible to team members who need it, but it can also assist you in preserving your data in case of some disaster, give you access to computing resources that you couldn’t procure yourself, and provide you flexible access to your business applications. 

Tech Tip Tuesday:

Don’t Shortchange Email (Business owners) 

Email is now the gold standard for business communications, for numerous reasons. While a small business might find it redundant to email an announcement, doing so can prove useful to their operations. For instance, let’s say Mary manages a small office with four or five employees. She could easily just announce an important message to the room, but what if James was at the dentist that day, or Rob had excused himself to the bathroom just before? What if Ellen had just connected for an important phone call? 

Email provides an easy way for you to communicate with others in your workplace that ensures everyone gets the message, without disrupting operations too much. 

Tech Tip Tuesday:

What to do with Non-Malicious Spam (Junk Email) 

Non-malicious spam normally comes in the form of junk marketing emails. If you no longer want to receive this type of communication, take the following steps:  

  1. Delete the email out of your mailbox   
  2. Mark the email as “Junk” in Outlook.  
  3. Unsubscribe form the email list.  A link to unsubscribe must be included in marketing emails.  

Tech Tip Tuesday:


Risks and Consequences of Not Having a Data Security Policy 

Despite the growing number of data breaches, most small and midsized businesses do not have well-established data security policies. The lack of a data security program opens the door to a wide variety of security risks, such as data theft, data tampering and unauthorized access to sensitive information. The impact of a single data breach can be much more devastating and result in huge financial loss. It can also have the following serious consequences: 

1. Damage Brand Reputation: A security breach can tarnish your brand’s image and drive away potential customers. Your customers will lose trust and confidence in your company. 

2. Disrupt Business Operations: The period of downtime from the moment a security incident occurs, right up to restoration, significantly affects business operations, leading to low productivity, revenue loss and unhappy customers. 

3. Legal Implications: Organizations that fall victim to data breaches face serious consequences including fines, legal action and compensation to customers. 

4. Loss of Intellectual Property: A data breach not only puts your company and customer information at risk, but you also run the risk of losing patents, blueprints and other certifications. 

Tech Tip Tuesday:

Adopt Technology Solutions 

Regardless of your industry, who your business serves, or even where you operate, there are some universal changes that technology has brought to how the average small-to-medium-sized business functions. Methods of collaboration have shifted to digital formats, “coming to work” is no longer a prerequisite to working, and the filing cabinet has been rendered woefully obsolete by other, better options. Cloud solutions are a major contributor to this. I want you to take a moment and consider something: why were any of these changes made in the first place? 

It is for the same reason that the assembly line process was adopted, or why we cook our food before eating it: it provides greater benefits than the old way. It is the same with business technology, and you will see this as a common theme throughout these tips. Don’t disqualify yourself from competing by removing your ability to do so.

Tech Tip Tuesday:

Managing Spam in Outlook 

Outlook has an array of tools for combating spam. Utilizing these tools is key to keeping your mailbox spam free  

  • Junk: The Junk folder is the default spam destination. Non-malicious spam and other marketing emails can be moved the junk folder. Sometimes emails are improperly labeled as junk and accidentally sent to the junk folder. It’s a good idea to review your spam mailbox periodically.  
  • Flag: Emails can be flagged as either “junk” or “spam”. After an email is flagged, it is automatically transferred to the junk folder  
  • Block Sender: Suspicious or unknown senders can be blocked. In the Outlook menu bar select Message > Junk Mail > Block sender. Outlook will then add the sender’s email to the “block sender” list. 

Tech Tip Tuesday:

How to Spot Spam 

  1. The sender’s address isn’t correct. If it’s a legitimate email the sender’s address should match the domain for the company they claim to represent. In other words, emails from PayPal always come from and emails from Microsoft always come from 
  2. The sender doesn’t seem to actually know who you are. Legitimate emails from companies and people you know will be addressed to you by name. Phishing emails often use generic salutations like “customer” or “friend.” 
  3. Embedded links have unusual URLs. Vet the URL before clicking by hovering over it with your cursor. If the link looks suspicious, navigate to the website directly via your browser. Same for any call-to-action buttons. Hover over them with your mouse before clicking. If you’re on a mobile device, navigate to the site directly or via the dedicated app. Text message spam often includes links to spoofed sites designed to capture your login. 
  4. Typos, bad grammar, and unusual syntax. Does it look like the email was translated back and forth through Google Translate several times? If so, it probably was. 
  5. The email is too good to be true. Advance-fee scams work because they offer a huge reward in exchange for very little work. But if you take some time to actually think about the email, the content is beyond reason. 
  6. There are attachments. In the world of email communication and marketing, attachments are a big no-no, and businesses generally don’t send emails with attachments.