Archive for May 2020
How to avoid the fake request phishing email scams and attacks
We’re seeing an increase in Phishing spam emails of late. For reasons outlined below, this type of message can be very difficult to automatically detect as spam so the best measures at this stage is education and vigilance for team members to avoid clicking on any links, supplying any info or responding to the request.…
Read MoreHow to check in and check out a file in Sharepoint via OneDrive Desktop app
This guide explains how to check a file in and out of Sharepoint via the One Drive Desktop app. When a file is checked out, it has a padlock icon next to it’s sync icon in the Finder. Also, in the Sharepoint web interface it displays a small arrow to show checked out. It…
Read MoreUsing the itac.technology Autotask ticket portal
Why and when to use the Autotask ticket portal: Check work in progress Review previous tickets, technician notes, invoices Access and update the list of the devices (called Configuration Items) and associated documentation we are monitoring and maintaining for you Lodge support tickets Add new contacts and team members, update your contact details in our…
Read MoreUsing the itac.technology Passportal password vault
Why and when to use the Passportal password vault: Securely store your business passwords Safely share them with your team and with itac.technology all from within the app Way more secure than the little black book or the spreadsheet on the desktop! Way more convenient as it is accessible from anywhere via the web and…
Read MoreUsing the itac.technology Malwarebytes anti-malware scanner
Why and when to use the Malwarebytes anti-malware scanner: Whenever you suspect a potential security issue on your device If your computer starts behaving weirdly If you feel you may have clicked on something or opened something you shouldn’t have We install Mawarebytes free on all workstations (macOS and Windows). In the case of Windows,…
Read MoreUsing the itac.technology N-Able RMM for asset tracking and remote desktop
Why and when to use the N-Able RMM: See what itac.technology see, review the list of devices we monitor and manage for your business at any given time, ultimate transparency Check device health, perform selected remote functions on them from within the dashboard Review device specs and performance all in one place Remotely access company…
Read More