Is cloud storage secure?

By Brandon Jackson

Cloud storage is extremely popular today, and we’re big fans. People are using tools from DropBox to OneDrive to store their files. But in a business environment, one major concern is the security of cloud storage. Nothing about the cloud makes it any more or any less secure than any other file storage method.

Read More

What are cybersecurity threats?

By John Merrey

Cybersecurity is protecting yourself agains online threats. Here at TeamLogic IT, we focus on protecting entire environments against malicious parties getting in. A lot of layers and methods of protection go into that.

Read More

Password vs passphrase

By Brandon Jackson

One of the key layers of cybersecurity is good password hygiene. But today’s security can make the situation more complex. Now you have password managers, two factor authentication using apps, fingerprint protection, and even facial identification.

Read More

How phishing is accomplished

By John Merrey

It’s important to protect yourself from phishing scams. But what is a phishing scam? How is phishing accomplished in the first place?

Read More

How password authentication works

By Brandon Jackson

Ever wondered why most systems can’t tell you what password you used when you signed up? Or wondered if your password was being stored insecurely by a service you were using? How can you even tell if it’s stored securely, and what does that mean?

Read More

How Office 365 works

By John Merrey

In years past, businesses purchased software, installed it on computers, and then at some point they had to upgrade it. That’s how everything worked, and Microsoft Office suite was no exception.

Read More

9 tips for addressing coronavirus in your business

By Davis Merrey

The Centers for Disease Control and Prevention (CDC) and World Health Organization (WHO) are recommending organizations have a plan for conducting business should the COVID-19 virus continue to affect the U.S. and world populations. Not every business can afford to close or move to a “work from home” environment, so what should you consider when developing a plan for your company and workers?

Read More

How cloud computing works

By Brandon Jackson

I’m often asked how cloud computing works. People tell me they have no experience with it and don’t understand it. The truth is, if you’ve had somebody hosting your email for ten years, then you’ve used cloud computing for ten years.

Read More

Can Office 365 be used on a Mac?

By John Merrey

If you work in an all-Mac environment, or even if you work in a Windows environment but one or two people have a Mac, you may have wondered if Office 365 can be used on a Mac. The short answer: Yes, but it depends how you’re using it. The online version of Office 365 If…

Read More

Are phishing attacks on the rise?

By Brandon Jackson

Nobody wants to believe they can become a victim of a phishing attack. After all, you’re smarter than that, right? The truth is that even smart people fall for them, and phishing attacks are on the rise as a result. However, the tactics they use have changed in the last year or so. When phishing…

Read More