How To Create a SharePoint Site: A Step by Step Guide

Go to the home page of your. Select + New, and then select Page. Alternately, you can go to an existing page, select + New, and select Start from a blank page. Or, you can choose Copy of this page to create a new page that has the same web parts and …

fridaynightfunkin.ninja

View More ...

Ntiva Help Desk and Customer Support

If you want to help your office and remote employees be more productive across time zones or across town, one of the first places you should start is with Microsoft 365 in general, and with Outlook in particular. Outlook is the application that integrates email, calendar and contacts to help your workers stay connected and productive, both in the office and on the go.

ntiva.com/customer-support

View More ...

How to Secure Office 365: Five Best Practices!

Tip 1: Know Your Enemy. The first step towards defending your Office 365 implementation is knowing how your enemies will try to attack it. The most common method is some kind of account takeover attack – this means that an attacker is going to try and steal one of your employees’ login credentials.

ntiva.com/blog/how-to-secure-office-365-best-practices

View More ...

Guide to Remote Work Security

When the COVID-19 pandemic struck in 2020, businesses quickly adapted. So did cybercriminals. Companies emptied their office buildings and sent their employees home to work remotely.And organized criminals quickly learned to exploit the “new normal” by targeting improperly secured connections, applications, and unprepared work-from-home (WFH) employees.

ntiva.com/guide-to-remote-work-security

View More ...

A Complete Guide to IT Infrastructure Management

The term infrastructure has been around since 1875 when the French coined it for planning their railroad system. But the concept of having a fundamental set of facilities, services, and systems in place started long before that as roads, canals, water systems, buildings, small towns and even entire cities started to …

ntiva.com/blog/a-complete-guide-to-it-infrastructure-management

View More ...

How To Develop an Effective IT Strategy For Your Business

1. Alignment with Business Objectives. An effective IT strategy should address the overall business goals and needs. The first step is therefore to understand the business objectives of each department and the entire organization, e.g., sales target, growth plan, marketing goals, new partnership opportunities, demand forecast, logistics, etc

ntiva.com/blog/how-to-develop-an-effective-it-strategy-for-your-business

View More ...

How to Fix Audio Issues in Microsoft Teams

2. Select the Audio Devices that You Want To Use. When you're in a call and you're having audio issues, make sure you have selected the right audio devices that you intend on using. You can do this by selecting the More Actions button (three little dots) from the toolbar. A pop up menu will appear - select Show Device Settings.

ntiva.com/blog/fix-audio-issues-in-microsoft-teams

View More ...

Set up Mobile Device Management for Office 365

For example, if an employee leaves your organization, wipe his/her mobile devices. To get started you must Active the Mobile Device Management service. Sign in to Office 365 with your global admin account. Click this link: Activate Mobile Device Management. It can take some time to activate Mobile Device Management for Office 365.

ntiva.com/blog/set-up-mobile-device-management-for-office-365

View More ...

After the CP Hack: 5 Best Ways to Protect YOUR Business!

Hackers use automated tools to constantly scan millions of connected devices that have not applied patches against vulnerabilities. Patch management is part of maintaining a healthy business, and if you don’t have a resource to do it for you – get one. 5. Backup and Recovery.

ntiva.com/blog/colonial-pipeline-hack-how-to-protect-your-business-from-cybercrime

View More ...

How to Perform an IT Risk Assessment

Step 1: Evaluating & Understanding Your Data. Assessment and evaluation go hand-in-hand, and some people might even argue that they’re the same thing. Although it’s an important one, evaluation is just one step of the process. The first half of the evaluation phase is all about understanding the critical resources that could be affected by

ntiva.com/blog/how-to-perform-an-it-risk-assessment

View More ...

Managed IT Services, IT Consulting, Cyber Security & Cloud

MANAGED IT SERVICES. Maintaining IT systems is a challenge for any business, especially with today’s fast changing technologies. Let us help you reduce both the cost and headache of trying to “do it yourself.”. IT SERVICES - LEARN MORE.

ntiva.com/

View More ...

How to Educate Your Employees on Cybersecurity

Every employee or contractor needs to be aware of your cyber security protocol from day 1, as soon as they're hired and have access to your network. Including cyber security training in the employee onboarding process not only ensures that new employees know how to stay safe but also creates a culture of awareness.

ntiva.com/blog/how-to-educate-your-employees-on-cybersecurity

View More ...

The One Best Way to Archive Your Outlook Email

Best Way to Archive Your Outlook Email - Exchange Online! Many people don't realize that Microsoft offers an unlimited amount of cloud-based archive storage for free, called Exchange Online Archiving. You do need to have the right Office 365 subscription level to take advantage of this feature, but once properly set up there are many benefits.

ntiva.com/blog/the-one-best-way-to-archive-your-outlook-email

View More ...

Can't Delete Email from iPad or iPhone

How to delete email from iPad or iPhone - Instructions: Go To Settings (Gear icon). iOS 9 and earlier: Tap Mail, Contacts, Calendars. iOS 10: Tap Mail. iOS 11: Tap Accounts and Passwords. Select your email account. Tap the "Account" line to pull up the settings sheet. Scroll to the bottom of the page and tap Advanced (At the very bottom.

ntiva.com/blog/cant-delete-email-from-ipad-or-iphone

View More ...

Using Technology To Reach Your Business Goals

The right technology investments made now can pay off later, launching your business to a higher level of performance and achievement. To determine the best path, it helps to sit down with a trusted adviser who offers a strong portfolio of IT consulting services. For starters, IT consultants work with many different suppliers and vendors, and

ntiva.com/blog/using-technology-to-reach-your-business-goals

View More ...

Office 365 Password Expired

To help protect your Office 365 account from the dastardly deeds of cyber criminals, it's good practice to periodically change your password — and use a secure (long) password!. However, it's easy to forget to update your password until it's too late and your company's password policy forces your hand.

ntiva.com/blog/office-365-password-expired

View More ...

The Pros and Cons of Automatic Software Updates

There’s no denying that automatic updating is a handy tool, but it’s not always the way to go. In some cases, manual updating is the safer solution, and all responsible Managed IT Service Providers understand that “automatic” doesn’t always mean “better.”. If you’re the type of person to turn on automatic updates for all of your devices and never think twice about it, you might

ntiva.com/blog/the-pros-and-cons-of-automatic-software-updates

View More ...

SharePoint vs OneDrive: What's the Difference

With a OneDrive personal account, the user always remains in control of his or her account. This makes it the perfect online storage solution for personal documents or files that are shared among a select few individuals. Although SharePoint is mainly marketed as a cloud storage management system, it's so much more than that.

ntiva.com/blog/sharepoint-vs-onedrive-whats-the-difference

View More ...

Updating Mac Keychain After a Password Change

Fortunately, the keychain can still be updated using the following method: Open Keychain Access located in Applications > Utilities. From the Edit menu, choose: Change Password for Keychain "login"…. Type the previous password, then click OK. If the correct password is entered, a new window appears. Enter the original password again in the

ntiva.com/blog/updating-keychain-after-a-password-change

View More ...

Endpoint Detection and Response (EDR) Definition and Guide

Endpoint Detection and Response, EDR for short, is a security solution that uses a combination of continuous monitoring and data collection on end user devices to detect potential cyber threats. The keyword here is endpoint; EDR doesn’t just monitor and analyze a network, but all endpoints (which basically just means all devices

ntiva.com/blog/endpoint-detection-and-response-edr-definition-and-guide

View More ...

Office 365: Using MFA with 3rd party email clients

Once you've successfully signed in go to https://aka.ms/MFASetup. (Yes, it can be slow to load.) Click the App Password link at the top. NOTE: it looks like it’s part of the page title so it’s easy to overlook — see screen grab below. Click the Create button. Make a name to identify which device this is for.

ntiva.com/blog/office-365-using-mfa-with-3rd-party-email-clients

View More ...

Guest Access In Microsoft Teams

Here is a short list of features that your guest WILL NOT have access to: *Your OneDrive or Sharepoint. Your calendar, scheduled meetings, or details. The ability to create or revise a team. The ability to invite other guests. The ability to browse for a team. Uploading files to a person-to-person chat.

ntiva.com/blog/guest-access-in-microsoft-teams-what-you-need-to-know

View More ...

A Balanced Approach to Secure Remote Working: The New Normal

A Balanced Approach to Secure Remote Working: The New Normal. By Holly Dowden | February 4, 2021. As more and more companies begin to adopt a remote work culture, there are many things for organizations to consider. This article takes a look at the top three considerations every company should explore for a safe and healthy working environment!

ntiva.com/blog/balanced-and-secure-approach-to-remote-working

View More ...

Best Practices for Creating Apple IDs

An Apple ID is a user name used to shop the iTunes Store, log in to iCloud, buy from the Apple Online Store, and more. An Apple ID is also essential to managing apps on an iOS device. Managing your own Apple ID across a few devices is not very complicated, but how does an organization with several — maybe several thousand — iOS devices handle Apple IDs?

ntiva.com/blog/best-practices-for-creating-apple-ids

View More ...

Zero Trust Security Model: What It Is and Why You Need It

There are three simple principles behind zero trust security. 1. Assume you’ve been breached already. 2. Verify explicitly. 3. Limit user access to just enough access and just-in-time access. With zero trust security, every aspect of the communication chain—the authentication chain, identity, data sources and more—is not to be trusted.

ntiva.com/blog/adopt-zero-trust-security-model-remote-workforce

View More ...

How Microsoft Intune MDM Keeps Remote Data Safe

Step 2: Configure Intune Settings for Entire Organization. Microsoft Intune provides an amazing mobile device management platform, but you also need trained staff who know how to use and maintain the solution. Our busy healthcare client had already chosen to outsource their IT needs, and so benefited from our fully-staffed team who would work

ntiva.com/blog/how-microsoft-intune-mdm-helps-keep-remote-data-safe

View More ...

The Absolute Best Microsoft Outlook Tips to Master Your Inbox

If you want to help your office and remote employees be more productive across time zones or across town, one of the first places you should start is with Microsoft 365 in general, and with Outlook in particular. Outlook is the application that integrates email, calendar and contacts to help your workers stay connected and productive, both in the office and on the go.

ntiva.com/blog/microsoft-outlook-tips-boost-worker-productivity-efficiency

View More ...

The Benefits of Hiring a Virtual CISO (vCISO)

But the main reason so many industries and companies are using vCISOs instead of recruiting someone permanent for an in-house is all about the benefits. There are so many advantages that come along with a vCISO, with these 3 standing out most: Security Expertise. More Opportunities for Learning/Training. Cost Effectiveness.

ntiva.com/blog/the-benefits-of-hiring-a-virtual-ciso

View More ...

Why Two-Factor Authentication Improves Your Security

Enter 2FA, one of the easiest ways to ensure the only person logging into your account is you, by adding an additional “factor” to your login procedure to verify your identity. 2FA uses two of three possible identifiers: The bottom line is that the more layers of defense, or factors, you have in place the harder a bad guy has to work to get

ntiva.com/blog/why-two-factor-authentication-improves-your-security

View More ...

The 6 Mobile Device Security Best Practices You Should

5. Remote Lock and Data Wipe. Every business should have a BYOD policy that includes a strict remote lock and data wipe policy. Under this policy, whenever a mobile device is believed to be stolen or lost, the business has the ability to protect the lost data by remotely …

ntiva.com/blog/top-5-mobile-device-security-best-practices

View More ...

The 3 Biggest Risks of Running Unsupported Software

There is nothing to stop you from using software that has been dropped. You may or may not care if you have access to new features, but you should keep in mind the 4 biggest risks: Missing out on new productivity features that your competition is already taking advantage of. Incompability with partners and customers that have already adopted

ntiva.com/blog/risks-of-running-unsupported-software-office-2007

View More ...

What Is Email Security: A Guide To Protecting Your Email

Email security is the broad term used to describe all of the different practices and procedures for protecting email accounts and the content within them. There are many components to email security including tools and techniques such as encryption, multi-factor authentication, password protection, employee security training, and more.

ntiva.com/blog/guide-to-email-security

View More ...

Why is Business Continuity Planning So Important

Continuity planning should be impact driven, meaning resources should be allocated based on the degree of business interruption in the event of a disaster. Budgets and resources aren’t unlimited, so be sure to place more attention on what poses a greater risk and divvy …

ntiva.com/blog/successful-business-continuity-and-disaster-recovery-program

View More ...

The Top 10 Questions People Ask IT Services Companies

The Top 10 Questions People Ask IT Services Companies. More companies than ever before are outsourcing part or all of their IT needs to a third party provider. The reasons are many, from budget to convenience to the ability to get access to advanced technology solutions, but the questions when shopping for a new provider tend to remain the same.

ntiva.com/blog/the-top-10-questions-people-ask-it-service-companies

View More ...

Cyber Security Services Ntiva

Ntiva’s Vulnerability Scanning and Remediation solution scans your network for the kinds of vulnerabilities attackers target most, including missing security patches, insecure settings, and unneeded services. The findings are analyzed, prioritized, and addressed, …

ntiva.com/cyber-security-services

View More ...

VPN vs VDI vs RDS: Which Remote Access Is Best For You

A VPN is generally the lowest cost solution. Minimal hardware is required and users can usually keep their existing devices. A VDI system is usually the most expensive, as there is an extra layer of software required to host a VDI system, most commonly Citrix or VMware. RDS may fall somewhere in the middle, depending on various factors.

ntiva.com/blog/differences-between-vpn-rds-vdi

View More ...

Simplifying NIST Compliance with Cybersecurity Managed

4. Orientation Meeting and Service Handoff. Our managed cybersecurity services included ensuring that all employees and subcontractors— anyone with access to company networks—had a monitored and managed user account in the system. We performed an inventory of all company computers, tagging them so they could be tracked.

ntiva.com/blog/cybersecurity-managed-services-government-contractor-improve-nist-compliance

View More ...

Legal IT Services and Help Desk Support Solutions for

IT services & support for law firms. Managed IT Services for the legal community has changed dramatically over the past few years. An influx of new technology, a distributed workforce with mobile devices and increasing cybersecurity concerns have changed the game. It's no longer enough for your Managed Service Provider (MSP) to provide break-fix services!

ntiva.com/legal-it-services

View More ...

Microsoft Azure vs. AWS vs. Google Cloud

You should choose AWS if: · You want a system that caters to developers. · You’re a startup or smaller company. · You need to create solutions quickly and cost-effectively. · You want an innovative and cutting-edge platform. Established in 2002, Amazon Web Services is the oldest provider on the cloud market.

ntiva.com/blog/azure-vs-aws-vs-google-cloud-best-for-business

View More ...

What To Do If Your IT Team is Overworked and Understaffed

3. The Employee to IT Technician Ratio is More than 70:1. 70:1 has become the new “standard” for IT team balancing, according to many sources. But this is a tricky problem to put an exact number on. On paper, this means you would have 70 employees for every Tier 1 Technician.

ntiva.com/blog/what-to-do-if-your-it-team-is-overworked-and-understaffed

View More ...

ADS