John Merrey

Where is Office 365 installed?

By John Merrey

Office 365 was released in 2011 as a cloud-based version of the popular Microsoft Office product line. Instead of getting new CDs every time Word, Excel, PowerPoint, and other programs update, users enjoy automatic upgrades for a monthly subscription fee. Without the CDs, though, where is Office 365 installed? Are there files on the computer,…

Read More

Is LastPass secure?

By John Merrey

LastPass is one of the most popular password management services out there, and it’s trusted by many users. But is it really secure? Why password managers exist Keeping track of passwords for everything online can get hard, so many users fall back on lazy habits like using the same password for everything. That’s horrible for…

Read More

Can phishing be prevented?

By John Merrey

Phishing is one of the most common online attacks. Last year 22 percent of attacks came through phishing, and if you’re not careful you could be a victim. This method of stealing someone’s data by spoofing a message from a legitimate company is an insidious trick that can be easier to fall for than you…

Read More

Can you work offline with Office 365?

By John Merrey

Office 365 is the latest edition of the popular Microsoft Office software, and it’s merged with online functionality to the point where you need an Internet connection for most tasks. But is it possible to work offline? How autosave works If you’re working on an online file in SharePoint or OneDrive, your changes will be…

Read More

Does a small business need a server?

By John Merrey

More and more companies are switching to cloud solutions instead of having an on premise server, meaning one located in the same physical location as the business. So how can you tell when your small business actually needs a server? Or do small businesses ever need a server?

Read More

What are cybersecurity threats?

By John Merrey

Cybersecurity is protecting yourself agains online threats. Here at TeamLogic IT, we focus on protecting entire environments against malicious parties getting in. A lot of layers and methods of protection go into that.

Read More

How phishing is accomplished

By John Merrey

It’s important to protect yourself from phishing scams. But what is a phishing scam? How is phishing accomplished in the first place?

Read More

How Office 365 works

By John Merrey

In years past, businesses purchased software, installed it on computers, and then at some point they had to upgrade it. That’s how everything worked, and Microsoft Office suite was no exception.

Read More

Can Office 365 be used on a Mac?

By John Merrey

If you work in an all-Mac environment, or even if you work in a Windows environment but one or two people have a Mac, you may have wondered if Office 365 can be used on a Mac. The short answer: Yes, but it depends how you’re using it. The online version of Office 365 If…

Read More

Are cloud services secure?

By John Merrey

Cloud services can be a great solution. You can get storage and software without worrying about constant upgrading and replacing local software and even hardware. But with any cloud services, security is always a concern.

Read More