How to Share Your Own Screen Using Zoom
Watch this brief video to learn how to share your screen during a Zoom meeting.
Share Multiple Screens Simultaneously with Zoom
Watch this short video to learn how to share multiple screens simultaneously during a Zoom meeting.
Home Hardware Recommendations
We have home hardware recommendations in order to help you be comfortable and productive in your home office.
Set up OneDrive on your iPhone or iPad
With OneDrive on your phone or tablet, your files are secure and accessible from anywhere, on all your devices.
Sync Files with OneDrive Files On-Demand
With OneDrive Files On-Demand, you can get to all your files in OneDrive or SharePoint Online, without having to download them and use storage space on your device.
How to Sync Files and Folders with OneDrive for Business
With OneDrive, you can sync files between your computer and the cloud, so you can get to them from anywhere.
Delete and Restore Files in OneDrive
When you delete a file or folder, it goes into the Recycle bin, where you have a chance to restore it.
Create Files and Folders in OneDrive for Business
With your files saved to OneDrive, you can create files and folders to manage your work.
Upload files and Folders to OneDrive for Business
Upload files to OneDrive for Business so you can get to them from anywhere, on almost any device.
How to use the OneDrive Mobile App
With OneDrive on your mobile device, you can access, upload, and share your files from anywhere.
Set up OneDrive on your Android Phone or Tablet
With OneDrive on your phone or tablet, your files are secure and accessible from anywhere, on all your devices.
OneDrive for Business Basics
In OneDrive, there are a few basics to learn that will help you find files and folders and get information about them.
What is OneDrive for Business?
OneDrive for Business is a great place where you can store, sync, and share your work files.
A Manager’s Guide for Full Remote Working
While you might have managed a couple of team members remotely to date, managing a fully remote team, while balancing the challenges of being remote yourself, might be a new experience for you. The following are some best practices to help guide you through it.
Mac Threats Are on the Rise
In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.
Are you subject to the California Consumer Privacy Act (CCPA)?
The California Consumer Privacy Act is designed to educate and protect California consumers about personal information that is being collected and sold, primarily by large, California companies.
5 Things to Know About Phishing Attacks
Only 66% of working adults correctly answered the question “What is phishing” in 2019 Proofpoint survey. This means one-third of adults do not know that phishing is a form of fraud in which cybercriminals try to scam people into providing sensitive information (e.g., login credentials, account information) or performing an action (e.g., clicking a link, opening an email attachment) in…
Business App Upgrades to Consider for your 2020 IT Budget
Microsoft will no longer support many business apps in 2020 because they are reaching the end of their lifecycles. Find out which popular programs are reaching this point so you can plan any needed upgrades and adjust your 2020 IT budget accordingly.
How to Manage Those Annoying Auto-Play Video Clips in Microsoft Edge
Microsoft Edge has several features to manage auto-play clips. For starters, Edge is designed to automatically silence these clips on background tabs — in other words, on web pages that are open but not currently being displayed. (Their tabs are greyed-out.) Edge also lets you mute auto-play clips on individual web pages as well as stop clips from running automatically…
The iPhone 11 Is Here But Is It Worth the Upgrade?
Apple has rolled out the new iPhone 11, but many iPhone users are wondering whether its enhancements are worth the cost of an upgrade. Here is how the phone compares to its predecessor.
Using Strong Passwords Is Not Always Enough to Stay Secure
Cybercriminals commonly use compromised passwords in cyberattacks. For example, in ransomware attacks, compromised passwords have now surpassed phishing scams as the No. 1 way to gain access to the systems in which the ransomware is planted, according to F-Secure’s “Attack Landscape H1 2019” report. And compromised passwords is No. 2 on hackers’ list of tools to use to gain access…
OneDrive Versus SharePoint Online
I am so excited about OneDrive, my cloud-based file sharing and storage application. Accessing it is as easy as logging into Office.com on my home computer or opening the OneDrive app on my work computer or phone. And now that I’ve been using it a while, I can’t imagine using anything else – it makes my life easier and allows me…
Mitigating the Risk of a Ransomware Attack
Xantrion’s cybersecurity program takes a risk based approach to preventing, detecting and recovering from a potential ransomware attack. We provide multilayered protections which consider the various methods criminals might use to penetrate a client’s network and protect against each of these attack vectors. We monitor client systems so that, should compromise occur, it can be quickly detected and shut down. Even…
3 Ways to Cultivate a Collaborative Workforce
In a study conducted by Microsoft and YouGov, more than 14,000 people in seven countries shared their views on collaboration and the tools they use to achieve it. The results reveal three insights that can help you cultivate a collaborative workforce: 1. Different Generations Prefer Different Collaboration Tools The Microsoft-YouGov study found that the collaboration tools people use most often…
15 Keyboard Shortcuts for Microsoft Excel and Word
Microsoft Word and Excel have been around for a long time, so they have many features, including more than 200 keyboard shortcuts. Using these shortcuts can save you time because you just need to press a combination of keys to perform an action. While trying to remember every single shortcut is impractical, it pays to learn the shortcuts for operations…
5 Ways to Ensure Your Data is Safe in the Cloud
While there are many services that fall under cloud computing, businesses often use the cloud to store data. Although security experts note that storing data in the cloud is a relatively safe practice, businesses should still take certain measures to protect their files. Here are five things you can do to help keep your business’s data safe in the cloud:…
Are your Employees Inadvertently Exposing Data?
The number is eye-opening: 83% of companies believe that employee errors have put sensitive business and customer data at risk of exposure, according to a study by Egress. More than 1,000 security professionals at US-based companies participated in this study. The study also identified the technologies that most often involved in this type of accidental data leak. Email services provided…
How to Choose Default Apps in Windows 10
It is common for people to have multiple apps that perform the same function on their Windows 10 computers. For instance, people might have several web browsers or email apps. Similarly, people often can open certain types of files with more than one program. For instance, they can open PDF files with a web browser such as Google Chrome or…
3 Ways Your iPhone Can Keep you Organized
If your iPhone is running iOS 11 or later, you can use it for more than just staying in touch with the office. Here are 3 features you can use to help your business trip go more smoothly: 1. Check a Flight’s Status If you are traveling by plane, you can use your iPhone to check your flight’s status before…