Amicus IT
Videos
Our videos are a great way to stay on top of small business IT trends and products. The videos Cover a wide variety of topics, these short snippets of useful information truly do have something for everyone.
You hit ‘send’ on countless emails each day, but have you ever stopped to think about the potential security risks lurking within your email signature? It’s often overlooked, yet it can be a prime target for cybercriminals looking to impersonate you. Watch our new video to discover how your email signature could be a security […]
Cyber security isn’t just an IT problem, it’s a critical concern for everyone in your St. Louis business. From the top executives to the newest interns, everyone plays a role in protecting your company from cyber threats. That’s where regular cyber security training comes in. Why Regular Cyber Security Training Matters Cyber criminals are constantly […]
Running a business in St. Louis is no small feat, and safeguarding your valuable data is paramount. Every day, businesses like yours encounter threats that can lead to devastating data loss. From cyberattacks and theft to unexpected disasters like fires or floods, the risks are real. But there’s a solution that can offer peace of […]
In 2025, Windows 10 will officially reach its end of life. For businesses across St. Louis, this means a critical transition is on the horizon. If your company relies on Windows 10, now is the time to plan for the future. Why End of Life Matters When Microsoft ends support for Windows 10, it will […]
The statistics are sobering: cyber attacks are on the rise, and it’s not a matter of if your business will be targeted, but when. The aftermath of an attack can range from a minor disruption to a full-blown disaster. The good news? There are proactive steps you can take to protect your St. Louis business. […]
We live in a world overflowing with cutting-edge communication tools. But amidst the shiny new apps, there’s an old workhorse that refuses to retire: email. While reliable and convenient, email also opens the door to a significant cybersecurity risk – especially for businesses. The Power of Access Imagine a hacker getting their hands on your […]
Your technology is the backbone of your business. But when things go wrong (and inevitably, they will), how you handle it can make or break your bottom line. Relying solely on a “break/fix” model – where you call IT support only when an emergency strikes – might seem cost-effective at first glance. However, this reactive […]
In today’s digital world, data is king. Your business’s sensitive information, from customer records to financial data, is constantly under threat of cyberattacks. A single breach can have devastating consequences, leading to financial losses, reputational damage, and even legal trouble. But there’s a powerful tool you can use to fight back: encryption. Encryption is the […]
Proactive Monitoring of your firm’s technology shouldn’t be an afterthought. In the fast-paced world of law, smooth sailing is paramount. Clients demand precision, deadlines loom, and every detail matters. But when it comes to your firm’s technology, is one rogue wave away from capsizing your operations? It’s easy to get wrapped up in the daily […]
The Chrome Web Store’s been given a massive makeover, and it’s all about making your team’s life easier. We have all the details.
Tired of waiting for Teams to load? Microsoft has heard your frustration and has rebuilt it from the ground up. The all-new Teams is faster and uses less memory; we give you all the details
Video calls stressing you out? You’re not alone. Scientists have warned about the negative effects of too much camera time. We have the solution for your team.
Sick of spam emails? We have details of a cool new tool to help keep us better protected.
Microsoft plans to charge for updates to Windows 10 starting next year (2025). We tell you your three options… and which we recommend.
Outsourcing IT is one way to maximize the growth of your business. When running a successful business, wearing every hat simply isn’t feasible. There comes a point where the need to safeguard your time becomes paramount, allowing you to focus on the bigger picture: fostering business growth. And in this landscape of responsibilities, your IT […]
The chip shortage is real, lead-times are long, let us help you avoid getting caught. I’m sure you’ve heard we’re in the middle of a global chip shortage? This the perfect storm and it’s limiting some technology supplies. Our video explains how you can avoid being caught in this shortage
There is a Task manager build into M365.
Microsoft is limiting facial and voice recognition AI to comply with their standard for responsible AI practices. Apps opening on computer startup can be annoying, and a waste of time. Follow this tutorial to turn this feature off.
USB technology is due for an upgrade. This is one upgrade you don’t need to worry about. USB is universal and is
Microsoft Teams Meeting Recap will summarize your meetings and even make a list of the action points. We show you its other benefits
We explain how Microsoft Edge is introducing some new security-boosting features to help you stay one step ahead.
There’s a setting in Edge that sends the images you view online to Microsoft. We give you all the details.
Cyber criminals are using images embedded into emails. We’ll tell you how to protect your business from these new phishing scams.
Cyber attacks aren’t reserved for big corporations. We show you how to protect your business from cyber criminals
There’s a new browser that keeps work and personal browsing totally separate. Here’s how it works and when it launches.
Microsoft and Samsung have joined forces to keep the data on your work mobiles safe and secure. We give you all the details
Microsoft finally has a fix for one of the oldest and most frustrating problems in Outlook – when the file you’re trying to send is too big. Here’s what’s changing in the next few weeks and how it affects you.
If you accidentally download a fake beta app, you could put your business at risk. Here we explain why.
Facebook can be a great platform to advertise your business but criminals have a new scam that you need to be aware of. We tell you what to look out for.
How many times have you opened WordPad in Windows when you meant to open Notepad? It looks like that problem will soon be gone for good. We explain why.
This latest stat we learned about phishing websites really surprised us. And it comes with good news about an enhanced way to protect your business. We give you all the details
Windows 11 has already boosted our productivity and saved us time, but it hasn’t finished improving our working lives just yet. We have all the details.
Microsoft is working hard to lead the AI revolution and its latest update to Teams will certainly make it a front-runner. We think the potential is unlimited, here we’ll tell you why.
Even passwords of 15 characters can be cracked by cyber criminals. Our latest tech update explains what to do instead
They say you can’t teach an old dog new tricks, but what happens when it’s a young pup that needs training? New research on people under 40 has revealed a scary attitude towards cyber security. We tell you more here.
Passwords could soon be a thing of the past, thanks to Passkeys. If you hate passwords, our latest tech update will make your day…
Do you trust your employees with sensitive business data? You might be shocked to learn how many business owners don’t. But why… ? We have the answers.
You might have heard about Microsoft Copilot, but what is it? And will it really make a difference to your workday or business? We explain it all here.
As we stand on the cusp of 2024, the horizon of cyber security is expanding into uncharted territories, promising both challenges and opportunities. The coming year is set to witness a surge in cyber threats, demanding a heightened vigilance from individuals and businesses alike. Ransomware attacks are anticipated to escalate, leveraging the formidable capabilities of […]
In recent years, our homes have become our primary workplaces, offering comfort and convenience. However, it’s crucial to address the security of your home office. Your computer, tablet, and even your router can be vulnerable to cyber threats, making it essential to take action to protect yourself and your team. By taking these measures, your […]
Artificial Intelligence (AI) isn’t just another fleeting trend—it’s a transformative force that’s here to stay. It’s more than just enhancing customer service and automating email responses; AI has the remarkable ability to revolutionize your legal practice, allowing you to surge ahead of your competition while supercharging productivity, efficiency, and overall success. In our latest video, […]
You’re probably familiar with the Microsoft 365 staples like Word, Excel, and PowerPoint. But did you know that your subscription comes with a treasure trove of lesser-known productivity tools that could be revolutionizing your workflow? It’s time to take a closer look at what you’re paying for but might not be using to its full […]
The Metaverse is an interactive virtual realm that allows people to engage with each other in new and exciting ways. Similar to an advanced version of the internet, users can immerse themselves in digital worlds and interact with others in real-time. The Potential for Businesses: The Metaverse presents immense opportunities for businesses to revolutionize customer […]
A comprehensive training plan for your employees to understand cybersecurity risk is essential. In the realm of cyber threats, small and medium-sized businesses are prime targets. Surprisingly, the weakest link in your defense is your own people. To address this vulnerability, comprehensive cybersecurity awareness training is crucial for every individual in your business. But before […]
Back Up Your Data. It Could Save Your Business. Disasters happen, even if we hope they never will. Fires, theft, cybercrime, and accidental deletions are just a few ways your business data can be lost. That’s why having a reliable backup system is crucial. Choosing the right system involves strategic planning. Consider what data needs […]
Undertaking a big IT project can be a major commitment. Before involving experts, you need to clarify three critical things: Goals and objectives: Define what you want to achieve with the project to ensure that the results align with your overall business strategy. Resources: Consider both financial and human resources required to establish a realistic […]
One of the most important steps you can take to protect your business from cyber threats is to use Multi-Factor Authentication (MFA). As our lives become increasingly digital, the need for strong online security measures becomes more pressing. MFA involves adding an extra layer of security to your online accounts beyond just a username and […]
When it comes to working with a technology partner, it’s important to have clear communication without all the technical jargon. That’s why we’ve created a short video outlining the 3 most crucial topics to discuss: Infrastructure Security Downtime By discussing these areas with your technology partner in simple terms, you’ll be able to ensure that […]
Email cyber attacks can be a major concern for any business. Whether it’s a phishing scam or a malicious link, criminals are always on the lookout for ways to gain access to your sensitive information. But don’t worry, we can show you 3 steps that you can take to help protect your business from these […]
Have you ever experienced slow wi-fi speeds? If so, you know how frustrating it can be. You and your team deserve better. Here are 5 quick ways to improve your Wi-Fi speed.
Password managers are one of the most effective tools for you and your firm’s securioty. USB is universal and is
Email is the most popular attack vector for malware and ransomware. People are usually the weakest point of any security system. Train your organization to combat phishing.
Browser Extensions can be helpful, but many are downright evil. Learn how browser extensions can affect your computer.
Password are becoming a thing of the past, Security is still important. Learn how your security is going to change over the next year.
Remote work has become a new way of doing business, not just an emergency response. Take the time now to do remote work correctly.
Toggle off “open on startup” for Teams and other apps Apps opening on computer startup can be annoying, and a waste of time. Follow this tutorial to turn this feature off.
Spam Emails Eat Up Hours of Your Time Contact us to find out more. Deleting spam emails without a spam filter can be annoying—and waste time. Find out what you can do to reclaim your time.
Hidden Time Wasters. Contact us to find out more. Notification spam is eating your employee’s productivity. Find out what is being done to stop it.
MS teams Tricks Contact us to find out more. Three productivity hacks to get more out of MS Teams Teams is an incredible tool for communication and collaboration. We’ve got hacks for Teams. You might not have seen these three before.
Businesses are replacing hardware, and spending more to remain secure and flexible. Contact us to find out more.
You’ve heard of fire drills, why not phish drills? Call us to find out more.
Stranger things have happened – walkie talkies are back Call us to find out more. Instant voice communication with your whole team at the push of a button: Walkie talkie comes to Teams If you like looking at all the new features in your Microsoft Teams application, you might have noticed the walkie talkie feature […]
Let’s schedule a review to make a plan! Call us to find out more.
If you are wasting time scheduling your time, check out Microsoft Booking. Call us to find out more.
If you manage projects, there’s toms of software you can use to assist you. In this week’s video, we recommend software that integrates (almost) perfectly with the M365 applications you already use. Ask us about M365 Project
The “it’ll never happen to me mindset” it the biggest risk to your business. Let’s readjust that thinking.
Finally a tool that is easy to use AND secure.
There is a Task manager build into M365.
Microsoft has a great tool that makes data management super easy and scalable.
Every business is at risk. Hackers use are smart and use automated tools that hunt out any opportunity for them, anywhere–especially “soft targets”. In our video, we tell you about one of the biggest causes security breaches… and how to protect your business.
Wouldn’t it be great if you could track your teams work patterns–like biorhythms? Microsoft can. Check out our new video to find out more.
You’ve probably heard of multi-factor authentication – or MFA. But what exactly is it? MFA is really simple to set up for most applications. If you’re not already using it, we recommend you get started immediately.
The longer your passwords, the harder they are to crack Makes sense, no? It amazes us how many people use the same short password over and over again because they can’t remember a secure one. Help your staff use unique, unbreakable passwords.
Here are 3 ways to become a paperless office: Phase out old technology and processes. And enjoy a leaner, greener way of doing business!
Is your team hiding security breaches? Honesty is always the best policy, and will never be punished. This is the culture your business should promote when it comes to potential breaches in cyber-security. When we’re busy, we can easily get tricked by an online scam. Because most are so believable. If your team feels like […]
The chip shortage is real, lead-times are long, let us help you avoid getting caught. I’m sure you’ve heard we’re in the middle of a global chip shortage? This the perfect storm and it’s limiting some technology supplies. Our video explains how you can avoid being caught in this shortage
Brainstorming is an important part of any collaboration. And Whiteboard, inside Microsoft 365, is the simple, no-nonsense way for teams to do it. Whiteboard does exactly what you might think. It’s a tool for sharing ideas with as many people as you like, in real time just by sharing a link. Whiteboard is at its […]
What are the advantages of “The Cloud” Should your business move to the cloud or not? First, let’s explain what this means. A ‘cloud based’ solution, simply means that your data is stored safely on remote servers. And you can access it from anywhere on any device. There are lots of benefits to going 100% […]
The data security equivalent of leaving your windows open Transcript: You’d never dream of leaving your home for the day with all of the doors and windows wide open. Yet this is what many business owners and managers do with their business’s IT. It’s the data security equivalent of leaving the windows open. So, thieves […]
Here are some ways to tell if hackers are already in your system. Transcript: Ransomware is one of the scariest things that can happen to your business’s IT. It’s where your data is encrypted so you can’t access it, and you must pay a huge ransom fee to get it back. Did you know that […]
You expect a new PC to be fast. Then you start it for the first time. It is full of software you didn’t want to need–bloatware. The below video shows where this software came from, and what to do about it.
Microsoft 365 has great collaboration and productivity tools built right in. Teams has a useful project planning tool included. View the video below for how-to use Microsoft Planner.
Why more and more St. Louis
businesses trust us with their IT
Working with small businesses I grew frustrated with two things.
One: The tools available for Fortune 500 companies were technically and economically out of reach for small businesses.
Two: IT companies servicing small businesses were not responsive to their clients.
Over the years we built relationships with vendors and created an economy-of-scale by bundling our clients’ needs to affordably provide small and medium businesses the same tools available to large enterprises. We use modern tools to prevent and manage as many issues as we can BEFORE they become problems—often even before our clients realize the issues exist.
We are maniacal about customer service. At St. Louis IT we know that even small IT issues can impact your entire operation.
While computer repair companies might look at an issue that affects only one employee as “low priority” and fall back on their contracted response time, we understand that if that single user is under deadline, it might be the most important issue in the company at that time. This is why we typically contact our clients within 15 minutes to talk about the issue they are having and prioritize them appropriately.