Amicus IT
Videos
Our videos are a great way to stay on top of small business IT trends and products. The videos Cover a wide variety of topics, these short snippets of useful information truly do have something for everyone.
One of the most important steps you can take to protect your business from cyber threats is to use Multi-Factor Authentication (MFA). As our lives become increasingly digital, the need for strong online security measures becomes more pressing. MFA involves adding an extra layer of security to your online accounts beyond just a username and
When it comes to working with a technology partner, it’s important to have clear communication without all the technical jargon. That’s why we’ve created a short video outlining the 3 most crucial topics to discuss: Infrastructure Security Downtime By discussing these areas with your technology partner in simple terms, you’ll be able to ensure that
Email cyber attacks can be a major concern for any business. Whether it’s a phishing scam or a malicious link, criminals are always on the lookout for ways to gain access to your sensitive information. But don’t worry, we can show you 3 steps that you can take to help protect your business from these
Have you ever experienced slow wi-fi speeds? If so, you know how frustrating it can be. You and your team deserve better. Here are 5 quick ways to improve your Wi-Fi speed.
Password managers are one of the most effective tools for you and your firm’s securioty. USB is universal and is
Email is the most popular attack vector for malware and ransomware. People are usually the weakest point of any security system. Train your organization to combat phishing.
Browser Extensions can be helpful, but many are downright evil. Learn how browser extensions can affect your computer.
Password are becoming a thing of the past, Security is still important. Learn how your security is going to change over the next year.
Remote work has become a new way of doing business, not just an emergency response. Take the time now to do remote work correctly.
Toggle off “open on startup” for Teams and other apps Apps opening on computer startup can be annoying, and a waste of time. Follow this tutorial to turn this feature off.
Spam Emails Eat Up Hours of Your Time Contact us to find out more. Deleting spam emails without a spam filter can be annoying—and waste time. Find out what you can do to reclaim your time.
Hidden Time Wasters. Contact us to find out more. Notification spam is eating your employee’s productivity. Find out what is being done to stop it.
MS teams Tricks Contact us to find out more. Three productivity hacks to get more out of MS Teams Teams is an incredible tool for communication and collaboration. We’ve got hacks for Teams. You might not have seen these three before.
Businesses are replacing hardware, and spending more to remain secure and flexible. Contact us to find out more.
You’ve heard of fire drills, why not phish drills? Call us to find out more.
Stranger things have happened – walkie talkies are back Call us to find out more. Instant voice communication with your whole team at the push of a button: Walkie talkie comes to Teams If you like looking at all the new features in your Microsoft Teams application, you might have noticed the walkie talkie feature
Let’s schedule a review to make a plan! Call us to find out more.
If you are wasting time scheduling your time, check out Microsoft Booking. Call us to find out more.
If you manage projects, there’s toms of software you can use to assist you. In this week’s video, we recommend software that integrates (almost) perfectly with the M365 applications you already use. Ask us about M365 Project
The “it’ll never happen to me mindset” it the biggest risk to your business. Let’s readjust that thinking.
Finally a tool that is easy to use AND secure.
There is a Task manager build into M365.
Microsoft has a great tool that makes data management super easy and scalable.
Every business is at risk. Hackers use are smart and use automated tools that hunt out any opportunity for them, anywhere–especially “soft targets”. In our video, we tell you about one of the biggest causes security breaches… and how to protect your business.
Wouldn’t it be great if you could track your teams work patterns–like biorhythms? Microsoft can. Check out our new video to find out more.
You’ve probably heard of multi-factor authentication – or MFA. But what exactly is it? MFA is really simple to set up for most applications. If you’re not already using it, we recommend you get started immediately.
The longer your passwords, the harder they are to crack Makes sense, no? It amazes us how many people use the same short password over and over again because they can’t remember a secure one. Help your staff use unique, unbreakable passwords.
Here are 3 ways to become a paperless office: Phase out old technology and processes. And enjoy a leaner, greener way of doing business!
Is your team hiding security breaches? Honesty is always the best policy, and will never be punished. This is the culture your business should promote when it comes to potential breaches in cyber-security. When we’re busy, we can easily get tricked by an online scam. Because most are so believable. If your team feels like
The chip shortage is real, lead-times are long, let us help you avoid getting caught. I’m sure you’ve heard we’re in the middle of a global chip shortage? This the perfect storm and it’s limiting some technology supplies. Our video explains how you can avoid being caught in this shortage
Brainstorming is an important part of any collaboration. And Whiteboard, inside Microsoft 365, is the simple, no-nonsense way for teams to do it. Whiteboard does exactly what you might think. It’s a tool for sharing ideas with as many people as you like, in real time just by sharing a link. Whiteboard is at its
What are the advantages of “The Cloud” Should your business move to the cloud or not? First, let’s explain what this means. A ‘cloud based’ solution, simply means that your data is stored safely on remote servers. And you can access it from anywhere on any device. There are lots of benefits to going 100%
The data security equivalent of leaving your windows open Transcript: You’d never dream of leaving your home for the day with all of the doors and windows wide open. Yet this is what many business owners and managers do with their business’s IT. It’s the data security equivalent of leaving the windows open. So, thieves
Here are some ways to tell if hackers are already in your system. Transcript: Ransomware is one of the scariest things that can happen to your business’s IT. It’s where your data is encrypted so you can’t access it, and you must pay a huge ransom fee to get it back. Did you know that
You expect a new PC to be fast. Then you start it for the first time. It is full of software you didn’t want to need–bloatware. The below video shows where this software came from, and what to do about it.
Microsoft 365 has great collaboration and productivity tools built right in. Teams has a useful project planning tool included. View the video below for how-to use Microsoft Planner.
Why more and more St. Louis
businesses trust us with their IT
Working with small businesses I grew frustrated with two things.
One: The tools available for Fortune 500 companies were technically and economically out of reach for small businesses.
Two: IT companies servicing small businesses were not responsive to their clients.
Over the years we built relationships with vendors and created an economy-of-scale by bundling our clients’ needs to affordably provide small and medium businesses the same tools available to large enterprises. We use modern tools to prevent and manage as many issues as we can BEFORE they become problems—often even before our clients realize the issues exist.
We are maniacal about customer service. At St. Louis IT we know that even small IT issues can impact your entire operation.
While computer repair companies might look at an issue that affects only one employee as “low priority” and fall back on their contracted response time, we understand that if that single user is under deadline, it might be the most important issue in the company at that time. This is why we typically contact our clients within 15 minutes to talk about the issue they are having and prioritize them appropriately.