Schedule meetings with Microsoft FindTime

Schedule meetings with Microsoft FindTime

The art of organizing a meeting is much like chess. Each player has different possible moves, or availabilities; and it’s up to you to strategize which pieces to move where, or which events to schedule (or reschedule) when. The objective is to land on a square wherein all participants can attend, but achieving this goal often demands a tiring and time-consuming process.

7 Twitter tactics to get more retweets

7 Twitter tactics to get more retweets

Managing your company’s Twitter account can be tricky. You have a lot of brilliant things to say in under 140 characters but the problem is getting more eyes on your tweets. What’s worse is that there are other companies competing with you to grab that attention.

Tap into the benefits of the human cloud

Tap into the benefits of the human cloud

Companies have increasing opportunities to tap into a virtual, on-demand workforce that’s proving to be a third-generation sourcing ecosystem for key talent. The human cloud offers a competitive advantage for startups and SMEs to compete with large enterprises by leveraging specialized skills and expertise that are outsourced globally.

Essential Microsoft Word formatting tips

Essential Microsoft Word formatting tips

Microsoft Word has been around for over 20 years, and for better or worse it has become increasingly complex. What started as a simple text editor has evolved into a multifaceted piece of writing, design and collaboration software. No matter how much time you spend with it, there are always new tricks to learn that let Word streamline your document creation.

App virtualization explained

App virtualization explained

For someone with limited IT experience, they could find themselves overwhelmed by their company’s IT demands. Fortunately, virtualization services are giving business owners a fighting chance. However, the term virtualization can refer to a number of different strategies.

Understand these 4 types of hackers

Understand these 4 types of hackers

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect.

Tips to get to 500+ LinkedIn connections

Tips to get to 500+ LinkedIn connections

Most people are still impressed when they see a LinkedIn profile with 500+ connections. It gives that person authority in their industry and shows they’re a valuable member of the business world. In other words, 500+ connections can help sell you and your business.

Can Your Business Survive A Disaster?

Can Your Business Survive A Disaster?

Disasters. They do happen — it’s only a matter of ‘when’. While most businesses acknowledge it, surveys show that only one in four companies worldwide have adequate protection in the event of a major disruption. We’re not talking about insurance here, but a Disaster Recovery (DR) plan that could save you thousands of dollars in losses and worse, a business closure.

Ask these 3 questions about your servers

Ask these 3 questions about your servers

Your heart is always there beating away 24-hours a day. This is also an apt description for your servers. They are always working, ensuring your business stays operational even if you don’t notice it. However, it’s not unusual for business owners to overlook their servers as most times it is a simple case of out of sight, out of mind.

The true story of an SME attacked by hackers

The true story of an SME attacked by hackers

When big companies like Dropbox or Ashley Madison are hacked, the whole world hears about it. But how often do you hear about cyber attacks on the SMEs of the world? Probably not often, or never. Well, today, that’s all about to change. The NY Times recently ran an article telling the story of a small enterprise just like you, who suffered a major cyber attack.