Blog

Categories
Employee Anniversaries Blog

Celebrating our July Employee Anniversaries

Our team is successful because of our people. By combining our core values of personal connections, doing the right thing, and being curious, we’ve been able to build a team full of amazing people.

This month, we recognize ten team members who celebrated their work anniversary in July! You can learn a little more about each of them below.

Categories
Blog Microsoft 365

Cheat Code: How To Use the Employee Ideas App in Microsoft Teams

Receiving valuable and consistent feedback from your team is an integral part of running your business. Sometimes it can be difficult to keep up with all of the incoming ideas. Luckily, there is a Microsoft Power App within Teams that allows you to do just that.

The Employee Ideas App allows you to effectively receive and manage any ideas that your team has. It also allows other team members to vote on the ideas, showing you a clear picture of what is considered to be a priority amongst your employees.

Check out this quick Cheat Code how-to video below to learn more! You can also continue scrolling to find a few of our previous Cheat Codes.

Categories
Blog Employee Anniversaries

Celebrating our December Employee Anniversaries

Our team would not be successful without the dedicated, hardworking, and awesome folks that help to make it up.

Yes, they’re IT professionals, but they’re also amazing people who embody all of our core values to the fullest extent by making personal connections, staying curious, and always striving to do the right thing.

Join us in celebrating our two December anniversaries! You can learn more about both of these team members below.

Categories
Blog Security Alerts

SECURITY ALERT: Log4j Vulnerability

WorkSmart is aware of the critical vulnerability in Apache Log4j that can be used to launch cyber attacks. We continue to work with our vendors to identify any potential vulnerabilities and ensure our tools are secure.

Here are details on the Log4j vulnerability, including who it impacts and what steps you can take to reduce the risk to your organization and your customers.

Categories
Blog Cybersecurity - Detection and Response Employee-friendly Content

Marissa Explains IT All: How to Spot A Phishing Email

Email is one of the most commonly used methods of communication in the workplace, however it’s also one of the most targeted areas for cybercriminals.

Phishing is a technique that hackers use to impersonate a trusted source and try to get any personal or sensitive information from you. These emails can come in many different forms, so it’s important to stay vigilant when it comes to keeping your account secure.

Check out the 60-second clip below to hear Marissa’s best tips on spotting these phishing emails before it’s too late. Continue scrolling for the full transcript and more cybersecurity tips to help protect your business.

Categories
Employee Anniversaries Blog

Celebrating our November Employee Anniversaries

As November comes to a close, especially in the season of giving thanks, we wanted to take some time to recognize a few of the folks that are celebrating their employee anniversary this month.

Not only do these team members assist our clients day-in and day-out with any technical issues that arise, they’re also amazing people who exemplify our core values in everything they do.

Join us in celebrating eight employee anniversaries this month! You can learn more about each of these team members below. We appreciate them all!

Categories
Cybersecurity - Prevention Blog

How to Protect Your Organization’s Email from Cyberattacks

Email is one of the most used methods of collaboration in the workplace. Unfortunately, it’s also become one of the most popular methods for cyberattack. From phishing emails to emails with malicious attachments, email can be as vulnerable as it is essential.

That’s why teaching your employees good security habits is incredibly helpful in protecting against email-based threats. They learn how to spot potential threats, but with how much we rely on email, more can be more when it comes to cybersecurity.

Categories
Blog IT Strategy and Infrastructure Webinars

Plan on IT: Building a Strategy
ON-DEMAND WEBINAR

With the end of the year approaching, it’s the perfect time to review your IT strategy.

Technology drives growth when it aligns with the organization’s goals. That’s why it’s important to check in on what went well, identify what needs improvement, and create a plan that continues to help your team get work done and reduce risks.

Join us for a webinar on IT strategy planning

In this webinar,  we’re focusing the discussion on planning IT for your current and future needs. More specifically, we’re talking about building a roadmap to leverage technology and tips for improving how technology supports your operations.

Topics covered:

  • Now and Then: Reflecting on the Current State of Your Technology
  • To Infinity and Beyond: Planning for the Future (and What You May Need to Consider for 2022)
  • On the Road(map) Again: IT Planning to Make it all Happen
Meet our guest:

Jim Rappl, Senior Business Advisor, Executive Management, at WorkSmart

Jim Rappl, Senior Business Advisor, Executive Management, at WorkSmart

After building and running a successful Managed IT Services provider for 13 years, Jim sold his company (Exceptional IT Services) to WorkSmart and joined the team in 2015.

As a Senior Business Advisor, Jim’s primary responsibilities include identifying strategic growth opportunities and forging new relationships with partners to identify how WorkSmart can help them to reach their fullest potential.

Jim also serves as an active executive management team member, helping to determine and implement business direction, gauge effectiveness, and adjust regularly using the EOS methodology.

 

Categories
Blog Cybersecurity - Prevention

Marissa Explains IT All: What is multi-factor authentication?

It’s no secret that securing all of your different accounts is crucial to keeping your data protected. Multi-factor authentication helps to provide an extra layer of security by requiring users to identify themselves using more than just a username and password.

How does it work? Check out Marissa’s 60-second explanation of multi-factor authentication below!

Categories
Cybersecurity - Prevention Blog

Benefits of Using Single Sign-On and Why It’s Important for Your Business

The use of the cloud is growing with software-as-a-service making it easy for small businesses to adopt technology without managing and maintaining any infrastructure. Plus, in the ever-changing hybrid workplace, cloud apps give your team access to what they need from anywhere.