Amicus Briefs
Your business relies on emails every day – that’s exactly why scammers target them. Here’s what you need to know.
Would your employees give an unknown caller access to your business devices? But what if they got a Teams chat from someone posing as Microsoft support? Here we tell you all about a new ransomware scam
Is your business running version 24H2 of Windows 11? You might be experiencing a small but annoying glitch when clicking “See more” in File Explorer. Here’s how to fix it.
The latest feature update in Teams is bringing a central notifications hub to keep things more organized. And a whole host of other useful features. We’ll tell you all about it here.
What’s easy to overlook but could leave your business open to cyber attacks? Unused logins. Yep, something as simple as failing to delete an old account could have serious costs for your business…
We know what you might be thinking: “Ugh, upgrades are a hassle.” But trust us, this one is worth it! And to show you just how easy and beneficial upgrading to Windows 11 can be, we’ve put together a short video. Check it out: Did you know that support for Windows 10 ends in just
Your business’s tech might be working well today, but is it ready for tomorrow? A new study has found more than 60% of business leaders aren’t confident about theirs. What about yours?
Microsoft is warning business owners that trusted cloud storage services are being hijacked to trick you into handing over your data. Here we tell you what you need to know.
If you work on your phone while you’re on the move, it can be a hassle to find the right file once you’re back at your PC. Here we tell you about a cool new feature coming to Windows 11 that will help.
Having trouble finding the sign out button in Windows 11? You’re not the only one! Luckily, Microsoft have listened… find out more here.
Thinking about upgrading your phone system? It’s a smart move for any business looking to stay competitive and improve communication. But with so many options out there, how do you choose the right one? Two popular solutions you’ll likely come across are VoIP and Cloud Telephony. Let’s break down the differences and help you decide
A sneaky new malware wants to annoy you into giving up your login details. It locks your browser in full screen mode, making you think you’re trapped… But you can easily escape and we’ll tell you how…
Trying to find your way through the Settings menu in Microsoft Edge might leave you overwhelmed but a new update is about to make it easier. Here we tell you how.
Your business data is backed up and recovery tools are in place. So, your data is safe, right? Sadly… not always. Here’s why we recommend backups are checked regularly..
Think the Windows 11 Photo app has little use in your business? Visual Search with Bing is about to change that, with some very useful new functionality… Find out more here.
You’ve hit send on an important email – then you notice a typo. Windows 11 lets you spellcheck and autocorrect across most of its apps. Here we help you to set it up
You hit ‘send’ on countless emails each day, but have you ever stopped to think about the potential security risks lurking within your email signature? It’s often overlooked, yet it can be a prime target for cybercriminals looking to impersonate you. Watch our new video to discover how your email signature could be a security
Tried Microsoft Copilot yet? It’s a smart tool baked into the applications you use every day, that could save you time. Here we tell you some cool ways it can help.
Still not upgraded your business to Windows 11? You’re missing out, and what for? It’s free to upgrade and easy. Find out more here.
The dreaded Blue Screen of Death makes you panic about what happened, how much work you’ve lost, and how long it’ll take to fix. But a lot of the time it’s avoidable… We’ll tell you how.
Microsoft’s enforcing an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.
Cyber security isn’t just an IT problem, it’s a critical concern for everyone in your St. Louis business. From the top executives to the newest interns, everyone plays a role in protecting your company from cyber threats. That’s where regular cyber security training comes in. Why Regular Cyber Security Training Matters Cyber criminals are constantly
Updates are a pain, right? Time consuming and disruptive. Not anymore… Here we tell you how Microsoft’s latest Windows 11 update is making things quicker and easier.
If you struggle to find the right words in an email or post, you’d probably love a little help. Draft with Copilot is exactly that. Here we tell you how it works.
Have you updated to the latest version of Windows 11 yet? If not, it’s time to act – Microsoft has announced when it will end support for older versions (and it’s soon!).
Have you heard of cyber extortion? It’s a very real threat to your business. Here we explain what it is and how to stay safe.
Running a business in St. Louis is no small feat, and safeguarding your valuable data is paramount. Every day, businesses like yours encounter threats that can lead to devastating data loss. From cyberattacks and theft to unexpected disasters like fires or floods, the risks are real. But there’s a solution that can offer peace of
Your PC might be frustratingly slow because too many applications are starting up when you hit the power button. Windows 11 has a new solution to tell you when new apps are added to your startup list. We have all the details.
Is the sound of yet another Teams notification about to drive you crazy? A new update will put a stop to that… and it’ll help you prioritize your tasks too. We have all the details here.
Chrome extensions are great for boosting productivity and saving time. But if they’re not the real deal, you could be at risk from malware. We tell you how to stay protected.
A new feature in Windows 11 may make accessing files on your Android phone much quicker. We have all the details.
Keeping your data away from the wrong hands is a big challenge. But thanks to Microsoft Edge for Business, it’s just become easier. Here we tell you why.
In 2025, Windows 10 will officially reach its end of life. For businesses across St. Louis, this means a critical transition is on the horizon. If your company relies on Windows 10, now is the time to plan for the future. Why End of Life Matters When Microsoft ends support for Windows 10, it will
After years of decline, ransomware attacks are on the rise again. And more businesses are being targeted. It’s time to protect your data. Here we explain how.
The faster your employees report a potential cyber security issue, the less damage is done to your business. But how can you encourage quick reporting? Here we share some solid ideas.
Microsoft isn’t happy just boosting individual productivity. Now it’s set its sights on helping your team work better together. We’ll tell you how.
Cyber security: More and more businesses are making the smart business decision to invest in it. Find out why you should join them.
The statistics are sobering: cyber attacks are on the rise, and it’s not a matter of if your business will be targeted, but when. The aftermath of an attack can range from a minor disruption to a full-blown disaster. The good news? There are proactive steps you can take to protect your St. Louis business.
Is your password keeping your data as safe as it could be? Maybe not. And there are new, safer alternatives to try. Here are all the details.
Has a pop-up notification ever embarrassed you while you were on a video call? Microsoft may finally have a feature to stop that happening. Learn more here.
Ever been caught out by a low laptop battery at the worst possible time? Here’s our professional advice to prolong your laptop battery’s lifespan.
Struggling from password overload? You’re not alone, and it’s putting your business at risk of data theft. Good news: There’s a very simple solution and we’ll tell you all about it.
You’re wasting your time on annual cyber security training. Why? Because it’s simply not cutting it anymore. Discover a better plan here.
We live in a world overflowing with cutting-edge communication tools. But amidst the shiny new apps, there’s an old workhorse that refuses to retire: email. While reliable and convenient, email also opens the door to a significant cybersecurity risk – especially for businesses. The Power of Access Imagine a hacker getting their hands on your
Teams is getting some Copilot-powered updates that will boost your business’s productivity even further. Here we tell you all about it.
Small and medium-sized businesses are at more risk of a malware attack than ever. It’s time to take action to protect your business. Here we tell you how.
In the never-ending mission to be more productive, the latest Microsoft Edge browser could be a powerful ally. We’re telling you about 3 of its best productivity features.
Bad news: Cyber criminals have yet another new phishing scam up their sleeves and it could be the most dangerous one yet. They’re using genuine subdomains that have been abandoned. We tell you how to stay safe.
Your technology is the backbone of your business. But when things go wrong (and inevitably, they will), how you handle it can make or break your bottom line. Relying solely on a “break/fix” model – where you call IT support only when an emergency strikes – might seem cost-effective at first glance. However, this reactive
Is upgrading to Wi-Fi 7 the right investment for your business? We look at the pros and cons of the next-gen wireless connection.
In today’s digital world, data is king. Your business’s sensitive information, from customer records to financial data, is constantly under threat of cyberattacks. A single breach can have devastating consequences, leading to financial losses, reputational damage, and even legal trouble. But there’s a powerful tool you can use to fight back: encryption. Encryption is the
Proactive Monitoring of your firm’s technology shouldn’t be an afterthought. In the fast-paced world of law, smooth sailing is paramount. Clients demand precision, deadlines loom, and every detail matters. But when it comes to your firm’s technology, is one rogue wave away from capsizing your operations? It’s easy to get wrapped up in the daily
The Chrome Web Store’s been given a massive makeover, and it’s all about making your team’s life easier. We have all the details.
Tired of waiting for Teams to load? Microsoft has heard your frustration and has rebuilt it from the ground up. The all-new Teams is faster and uses less memory; we give you all the details
Video calls stressing you out? You’re not alone. Scientists have warned about the negative effects of too much camera time. We have the solution for your team.
Sick of spam emails? We have details of a cool new tool to help keep us better protected.
Microsoft plans to charge for updates to Windows 10 starting next year (2025). We tell you your three options… and which we recommend.
Outsourcing IT is one way to maximize the growth of your business. When running a successful business, wearing every hat simply isn’t feasible. There comes a point where the need to safeguard your time becomes paramount, allowing you to focus on the bigger picture: fostering business growth. And in this landscape of responsibilities, your IT
The chip shortage is real, lead-times are long, let us help you avoid getting caught. I’m sure you’ve heard we’re in the middle of a global chip shortage? This the perfect storm and it’s limiting some technology supplies. Our video explains how you can avoid being caught in this shortage
There is a Task manager build into M365.
Microsoft is limiting facial and voice recognition AI to comply with their standard for responsible AI practices. Apps opening on computer startup can be annoying, and a waste of time. Follow this tutorial to turn this feature off.
USB technology is due for an upgrade. This is one upgrade you don’t need to worry about. USB is universal and is
Microsoft Teams Meeting Recap will summarize your meetings and even make a list of the action points. We show you its other benefits
We explain how Microsoft Edge is introducing some new security-boosting features to help you stay one step ahead.
There’s a setting in Edge that sends the images you view online to Microsoft. We give you all the details.
Cyber criminals are using images embedded into emails. We’ll tell you how to protect your business from these new phishing scams.
Cyber attacks aren’t reserved for big corporations. We show you how to protect your business from cyber criminals
There’s a new browser that keeps work and personal browsing totally separate. Here’s how it works and when it launches.
According to IT Support Providers Using End-of-Life Computers is Dangerous: A Comprehensive Insight In today’s rapidly advancing technological world, keeping up with the latest computer systems might seem challenging, especially for those who are budget conscious. However, the use of end-of-life (EOL) computers – those that have reached the end of their regular support and
Microsoft and Samsung have joined forces to keep the data on your work mobiles safe and secure. We give you all the details
Microsoft finally has a fix for one of the oldest and most frustrating problems in Outlook – when the file you’re trying to send is too big. Here’s what’s changing in the next few weeks and how it affects you.
If you accidentally download a fake beta app, you could put your business at risk. Here we explain why.
Facebook can be a great platform to advertise your business but criminals have a new scam that you need to be aware of. We tell you what to look out for.
How many times have you opened WordPad in Windows when you meant to open Notepad? It looks like that problem will soon be gone for good. We explain why.
This latest stat we learned about phishing websites really surprised us. And it comes with good news about an enhanced way to protect your business. We give you all the details
Windows 11 has already boosted our productivity and saved us time, but it hasn’t finished improving our working lives just yet. We have all the details.
Microsoft is working hard to lead the AI revolution and its latest update to Teams will certainly make it a front-runner. We think the potential is unlimited, here we’ll tell you why.
Even passwords of 15 characters can be cracked by cyber criminals. Our latest tech update explains what to do instead
They say you can’t teach an old dog new tricks, but what happens when it’s a young pup that needs training? New research on people under 40 has revealed a scary attitude towards cyber security. We tell you more here.
Passwords could soon be a thing of the past, thanks to Passkeys. If you hate passwords, our latest tech update will make your day…
Do you trust your employees with sensitive business data? You might be shocked to learn how many business owners don’t. But why… ? We have the answers.
You might have heard about Microsoft Copilot, but what is it? And will it really make a difference to your workday or business? We explain it all here.
As we stand on the cusp of 2024, the horizon of cyber security is expanding into uncharted territories, promising both challenges and opportunities. The coming year is set to witness a surge in cyber threats, demanding a heightened vigilance from individuals and businesses alike. Ransomware attacks are anticipated to escalate, leveraging the formidable capabilities of
In recent years, our homes have become our primary workplaces, offering comfort and convenience. However, it’s crucial to address the security of your home office. Your computer, tablet, and even your router can be vulnerable to cyber threats, making it essential to take action to protect yourself and your team. By taking these measures, your
Artificial Intelligence (AI) isn’t just another fleeting trend—it’s a transformative force that’s here to stay. It’s more than just enhancing customer service and automating email responses; AI has the remarkable ability to revolutionize your legal practice, allowing you to surge ahead of your competition while supercharging productivity, efficiency, and overall success. In our latest video,
You’re probably familiar with the Microsoft 365 staples like Word, Excel, and PowerPoint. But did you know that your subscription comes with a treasure trove of lesser-known productivity tools that could be revolutionizing your workflow? It’s time to take a closer look at what you’re paying for but might not be using to its full
IT Support Providers agree that patching computers is a crucial aspect of maintaining security, stability, and optimal performance. Here’s why it’s so important: Security Updates: Many patches are designed to close vulnerabilities in operating systems and applications that can be exploited by hackers and malware. These vulnerabilities, if left unpatched, could allow unauthorized access to
The Metaverse is an interactive virtual realm that allows people to engage with each other in new and exciting ways. Similar to an advanced version of the internet, users can immerse themselves in digital worlds and interact with others in real-time. The Potential for Businesses: The Metaverse presents immense opportunities for businesses to revolutionize customer
A comprehensive training plan for your employees to understand cybersecurity risk is essential. In the realm of cyber threats, small and medium-sized businesses are prime targets. Surprisingly, the weakest link in your defense is your own people. To address this vulnerability, comprehensive cybersecurity awareness training is crucial for every individual in your business. But before
Back Up Your Data. It Could Save Your Business. Disasters happen, even if we hope they never will. Fires, theft, cybercrime, and accidental deletions are just a few ways your business data can be lost. That’s why having a reliable backup system is crucial. Choosing the right system involves strategic planning. Consider what data needs
Undertaking a big IT project can be a major commitment. Before involving experts, you need to clarify three critical things: Goals and objectives: Define what you want to achieve with the project to ensure that the results align with your overall business strategy. Resources: Consider both financial and human resources required to establish a realistic
One of the most important steps you can take to protect your business from cyber threats is to use Multi-Factor Authentication (MFA). As our lives become increasingly digital, the need for strong online security measures becomes more pressing. MFA involves adding an extra layer of security to your online accounts beyond just a username and
When it comes to working with a technology partner, it’s important to have clear communication without all the technical jargon. That’s why we’ve created a short video outlining the 3 most crucial topics to discuss: Infrastructure Security Downtime By discussing these areas with your technology partner in simple terms, you’ll be able to ensure that
Email cyber attacks can be a major concern for any business. Whether it’s a phishing scam or a malicious link, criminals are always on the lookout for ways to gain access to your sensitive information. But don’t worry, we can show you 3 steps that you can take to help protect your business from these
Have you ever experienced slow wi-fi speeds? If so, you know how frustrating it can be. You and your team deserve better. Here are 5 quick ways to improve your Wi-Fi speed.
Hello, Last week, our security team reiterated some recommendations that we will confirm are implemented in your environment. Here are some protocols we are going to be confirming or enabling. Multi Factor Authentication is enabled and REQUIRED for all employees. Conditional Access – People and computers must meet certain conditions to log in to your
Password managers are one of the most effective tools for you and your firm’s securioty. USB is universal and is
When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom. But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data. Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed […]
Microsoft has become the leader of productivity over many decades. Can you imagine doing your day to day work without their software? So, it’s no surprise the tech giant recently conducted a major new survey into productivity in the workplace – and some of the results might surprise you. Researchers surveyed 20,000 people working for […]
Email is the most popular attack vector for malware and ransomware. People are usually the weakest point of any security system. Train your organization to combat phishing.
Browser Extensions can be helpful, but many are downright evil. Learn how browser extensions can affect your computer.
Password are becoming a thing of the past, Security is still important. Learn how your security is going to change over the next year.
Remote work has become a new way of doing business, not just an emergency response. Take the time now to do remote work correctly.
Toggle off “open on startup” for Teams and other apps Apps opening on computer startup can be annoying, and a waste of time. Follow this tutorial to turn this feature off.
Spam Emails Eat Up Hours of Your Time Contact us to find out more. Deleting spam emails without a spam filter can be annoying—and waste time. Find out what you can do to reclaim your time.
Hidden Time Wasters. Contact us to find out more. Notification spam is eating your employee’s productivity. Find out what is being done to stop it.
MS teams Tricks Contact us to find out more. Three productivity hacks to get more out of MS Teams Teams is an incredible tool for communication and collaboration. We’ve got hacks for Teams. You might not have seen these three before.
Businesses are replacing hardware, and spending more to remain secure and flexible. Contact us to find out more.
You’ve heard of fire drills, why not phish drills? Call us to find out more.
Stranger things have happened – walkie talkies are back Call us to find out more. Instant voice communication with your whole team at the push of a button: Walkie talkie comes to Teams If you like looking at all the new features in your Microsoft Teams application, you might have noticed the walkie talkie feature
Last week there were stories that a password manager called LastPass had seen some of its customers’ master passwords compromised. The company denies that happened. And it’s possible that some of the people who reported being affected had old accounts with master passwords they’d used with other services. Do you use a password manager in
Let’s schedule a review to make a plan! Call us to find out more.
A new survey just released by a specialist website has confirmed that phishing attacks remain the greatest cyber security threat to businesses. Phishing is where a hacker sends you an email pretending to be from someone else. They might fake an email from your bank, for example. When you click a link in the email,
If you are wasting time scheduling your time, check out Microsoft Booking. Call us to find out more.
If you manage projects, there’s toms of software you can use to assist you. In this week’s video, we recommend software that integrates (almost) perfectly with the M365 applications you already use. Ask us about M365 Project
The “it’ll never happen to me mindset” it the biggest risk to your business. Let’s readjust that thinking.
Finally a tool that is easy to use AND secure.
There is a Task manager build into M365.
Microsoft has a great tool that makes data management super easy and scalable.
Every business is at risk. Hackers use are smart and use automated tools that hunt out any opportunity for them, anywhere–especially “soft targets”. In our video, we tell you about one of the biggest causes security breaches… and how to protect your business.
Wouldn’t it be great if you could track your teams work patterns–like biorhythms? Microsoft can. Check out our new video to find out more.
You’ve probably heard of multi-factor authentication – or MFA. But what exactly is it? MFA is really simple to set up for most applications. If you’re not already using it, we recommend you get started immediately.
The longer your passwords, the harder they are to crack Makes sense, no? It amazes us how many people use the same short password over and over again because they can’t remember a secure one. Help your staff use unique, unbreakable passwords.
Here are 3 ways to become a paperless office: Phase out old technology and processes. And enjoy a leaner, greener way of doing business!
Is your team hiding security breaches? Honesty is always the best policy, and will never be punished. This is the culture your business should promote when it comes to potential breaches in cyber-security. When we’re busy, we can easily get tricked by an online scam. Because most are so believable. If your team feels like
The chip shortage is real, lead-times are long, let us help you avoid getting caught. I’m sure you’ve heard we’re in the middle of a global chip shortage? This the perfect storm and it’s limiting some technology supplies. Our video explains how you can avoid being caught in this shortage
Brainstorming is an important part of any collaboration. And Whiteboard, inside Microsoft 365, is the simple, no-nonsense way for teams to do it. Whiteboard does exactly what you might think. It’s a tool for sharing ideas with as many people as you like, in real time just by sharing a link. Whiteboard is at its
What are the advantages of “The Cloud” Should your business move to the cloud or not? First, let’s explain what this means. A ‘cloud based’ solution, simply means that your data is stored safely on remote servers. And you can access it from anywhere on any device. There are lots of benefits to going 100%
A couple months ago, we got a call from a new potential client. For the purposes of this story, we’ll call them VeeCo. VeeCo used to have an IT service provider, but they ended the relationship a couple years ago when they realized they could save money by having one of their computer-savvy phone technicians
The data security equivalent of leaving your windows open Transcript: You’d never dream of leaving your home for the day with all of the doors and windows wide open. Yet this is what many business owners and managers do with their business’s IT. It’s the data security equivalent of leaving the windows open. So, thieves
Here are some ways to tell if hackers are already in your system. Transcript: Ransomware is one of the scariest things that can happen to your business’s IT. It’s where your data is encrypted so you can’t access it, and you must pay a huge ransom fee to get it back. Did you know that
In 2019, two thirds of all organizations reported some type of incident relating to cyber-crime. You could make a sure bet this figure rose significantly last year, thanks to criminals taking advantage of the pandemic. It’s easy to look at big figures like these, and not relate them back to your own business. But here’s
You expect a new PC to be fast. Then you start it for the first time. It is full of software you didn’t want to need–bloatware. The below video shows where this software came from, and what to do about it.
Microsoft 365 has great collaboration and productivity tools built right in. Teams has a useful project planning tool included. View the video below for how-to use Microsoft Planner.
It is difficult to give a concise answer to what IT services will cost because every client is different and IT companies offer different services and different models of service delivery. Read this article for a description of the different service delivery models. Companies offering a Break/Fix model usually charge an hourly rate. Since clients
What are the different IT Service models? There are three main models in delivering IT services. They are Break/Fix, Block Hours, and Managed Services. Each has its advantages and disadvantages, and the more you know about how each model functions, the better prepared you are to make decisions for your company. What is Break/Fix IT
As business IT professionals, we’ve seen some things. Things that would horrify you. Things you would never want to encounter in your own organization. We’re talking security breaches, data theft and file corruption. That have brought entire businesses to their knees. This is something that you – as the business owner or manager – really
Oh… 2020This year was supposed to be so good. It was almost a metaphor… 20/20 vision. Seeing things clearly. Going for gold. But it all came crashing down almost as soon as it began. Perhaps it was a metaphor, but not the one we first imagined. Now we can see clearly the changes we need
IT’S THE FASTEST GROWING CRIME ON THE PLANET but what does ransomware mean to you? If you’ve heard of it, you may have put two and two together. And figured out that ransomware is a form of malware (malicious software) that holds your business to ransom. Cyber criminals take control of your files, photographs, and
I am going to start off by telling you something NOT true: The Operating System (OS) is the most basic programming on your computer. The truth is that there is something called the BIOS which is more basic, but for our purposes, we can think of the OS as the most basic. Simply put, The
Case or ‘Box’ or Tower The case or box is the outside of the computer that contains all the other parts. It usually has the brand of the computer imprinted on it. If your computer is siting on your desk, this is the part that you see. I know this sounds simplistic, but I have
Why more and more St. Louis
businesses trust us with their IT
Working with small businesses I grew frustrated with two things.
One: The tools available for Fortune 500 companies were technically and economically out of reach for small businesses.
Two: IT companies servicing small businesses were not responsive to their clients.
Over the years we built relationships with vendors and created an economy-of-scale by bundling our clients’ needs to affordably provide small and medium businesses the same tools available to large enterprises. We use modern tools to prevent and manage as many issues as we can BEFORE they become problems—often even before our clients realize the issues exist.
We are maniacal about customer service. At St. Louis IT we know that even small IT issues can impact your entire operation.
While computer repair companies might look at an issue that affects only one employee as “low priority” and fall back on their contracted response time, we understand that if that single user is under deadline, it might be the most important issue in the company at that time. This is why we typically contact our clients within 15 minutes to talk about the issue they are having and prioritize them appropriately.