Blog

3 Ways For A Business To Avoid Taking Itself Hostage

As a former hostage negotiator for the FBI, I have been writing about ways negotiators take themselves hostage and what you can do to avoid making these same missteps. I’ve recently identified three new negotiation tactics that end up putting you in a terrible position at the table. Read on to learn more about each of them ...

Read More

Influencing A Movement

Discovery Channel’s Mike Rowe On The Power Of Authenticity In Communication To Influence Your Audience Mike Rowe’s mother, Peggy Rowe, always finds a way to outdo her son — and she does so in a way only mothers can. “I am so brutally and relentlessly upstaged at every turn by my mother,” Mike said. Peggy Rowe is a ...

Read More

Microsoft Quick Assist

Whenever we use an application, or something goes wrong with our wireless device, the first thought that comes to mind is that help is needed.  Heavy amounts of frustration can lie in whenever we have to call a tech support number, and have to wait for a long period of time in order to get ...

Read More

Document Sensitivity In M365

Document sensitivity refers to the classification of documents based on their level of confidentiality. It is a way of ensuring that sensitive information is protected from unauthorized access and disclosure. Sensitivity labels can be applied to files and emails to keep them compliant with your organization’s information protection policies. The labels can be applied manually ...

Read More

Proposed Changes To The CMMC 2.1

The CMMC is an acronym that stands for the “Cybersecurity Maturity Model Certification”.  As our past article and whitepapers have covered  extensively, it is essentially where the Defense Industrial Base and their subcontractors have to achieve a certain level of certification before they are allowed to bid for work-related contracts.  We are now in the ...

Read More

How To Increase The Size Of Your Outlook Mailbox

When it comes to email, storage space can fill up very quickly, and even exceed our allotted quota.  But when  this happens, at least when it comes to Outlook, the first temptation is to go up to the next tier.  But the drawback with this is that it will cost more for you to do ...

Read More

Bing Chat Enterprise

Bing Chat Enterprise is a new feature of Bing that gives your organization AI-powered chat for work with commercial data protection. You can use Bing Chat Enterprise to get work done faster, be more creative, or support customers better. All of this can be done with the confidence that your data is protected and will ...

Read More

This HUGE And Recent Data Breach Practically Guarantees YOUR Personal Information Was Stolen

Back in May, the company MOVEit, a file transfer platform made by Progress Software, was compromised by a Russian ransomware operation called Cl0p. They used a vulnerability in Progress’s software that was unknown to exist at the time. Shortly after the attack was noticed, a patch was issued. However, some users continued to be attacked ...

Read More

Scammers Are Using These 10 Popular Brands To Trick You Into Revealing Your Private Data

Cybercriminals know the easiest way to sneak under your radar is to pretend to be a brand you know and trust. These large companies have spent years on marketing, customer service, branding and consistency to build a trustworthy reputation, and hackers leverage this to go after you. The most common method is to use phishing attacks. ...

Read More

How To Take Screenshots On a Windows Device

There is no doubt that Microsoft Word is probably the most widely used software package for creating and distributing content.  But apart from the written word, the ability to embed images into a Word doc is obviously important in order to convey the message.  True, there are dedicated tools that you can use for this ...

Read More