Envision BizTech Insider

Practical technology insights to give your business a competitive edge

Blog

Four ways to spot online fraud

Four ways to spot online fraud

Courtesy of Cindy Bates, Vice President, Microsoft U.S. SMB group Many will recall 2014 as the year of the data breach. From individuals to major brands, it seemed that no one was immune to the threat of a cyber attack. While 2014 was particularly worrisome, these types of breaches have been on the rise in recent years and are predicted to be a continued threat.

Even more VoIP features you should use

Even more VoIP features you should use

When a potential VoIP provider throws a list of features they can offer at you, it can all be quite confusing and you might even forget about a lot of them. Even after you’ve chosen your provider, you might already be too busy to bother with certain features of your new VoIP service.

7 Warning signs of malware infection

7 Warning signs of malware infection

As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection.

10 Office 365 features you need for work

10 Office 365 features you need for work

Whether you need suggestions for your PowerPoint presentation, someone to edit your Word document or input a lot of data into Excel, Office 365 has the features to help you with a variety of tasks. So the next time you need some help getting work done, try using these tricks with Office 365.

Simultaneously edit a document with other people

With Office 365, people can work together on any Word, PowerPoint or Excel document in real time.

Disaster Recovery myths that no longer apply

Disaster Recovery myths that no longer apply

With technology changing so rapidly, it’s easy to get caught up in outdated beliefs. And when it comes to Disaster Recovery, far too often do we see business owners still clinging to ideas that no longer apply. So, what kind of DR myths are still widely accepted by the masses? Here are three that need to be retired into IT folklore.