Blog

10 Office 365 features you need to know about

Whether you need suggestions for your PowerPoint presentation, someone to edit your Word document or input a lot of data into Excel, Office 365 has the features to help you with a variety of tasks. So the next time you need some help getting work done, try using these tricks with Office 365.
Simultaneously edit a document with other people
With Office 365, people can work together on any Word, PowerPoint or Excel document in real time.

How to switch securely to Office 365

The decision to migrate from an on-site SharePoint system to a cloud-based Office 365 solution isn’t one that most small or medium-sized businesses take lightly. In fact, though the popularity of Office 365 and other cloud-hosted platforms continues to soar, plenty of companies still have legacy SharePoint systems in place for at least part of their operations.

Healthcare’s technological makeover

We may expect to find computers everywhere these days, from our offices, schools and airports to our pockets and wrists, but until now there's not been much call for computers in our hospital operating rooms. But new technology is making waves in healthcare circles and could even save lives by helping surgeons and physicians make life and death decisions.

How to speed up your Windows 10 computer

You’re likely a busy person. So the last thing you want to be bothered with is a slow computer. If you’ve recently upgraded to Windows 10, you may be surprised (and slightly annoyed) to discover that it’s running much slower than expected. So what can you do? Here are a few steps you can take to significantly speed up your new OS.
Prevent programs from launching at startup
Windows loads several programs at startup so they’re quickly available.

Cyber threats and the finance sector

TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware.