As we near the end of October, we wanted to take some time and recognize our employee anniversaries for this month!
Our team is full of IT professionals who believe in our core values – doing the right thing, personal connections, and being curious. By building a team who exemplify these values to the fullest extent, we’re able to provide our clients a unique and valuable experience.
Help us celebrate each of these folks below – we appreciate them all!
Secure file sharing is crucial to being able to collaborate with others – especially in the hybrid workplace. We’re not always working in the same brick and mortar space, yet we need to be working on the same project.
The process of secure file sharing through Microsoft 365 is simple, but there are a few settings you should take notice of to make sure that your files are staying secure and not getting in the wrong hands.
Managing tasks with due dates can get chaotic, especially in a team atmosphere. Juggling multiple projects with varying deadlines and dependencies can overwhelm even the most organized employees.
With multiple files, documents and notes being created by each member, a task management software is an essential tool in managing these processes.
They say first impressions count for everything. While we believe it’s important to establish the tone of a great relationship from the outset, we know that maintaining excellent support and customer service is just as significant.
This is where we take the relationship from ‘transactional vendor’ to ‘strategic partner’.
One click on the wrong link helps cyber threats sneak around your organization’s security measures.
Whoops.
With cybercrimes and ransomware attacks on the rise, training that helps you build good cyber hygiene remains critical. By learning about potential threats and cybersecurity best practices, you can protect yourself and your organization.
Join us for a cybersecurity training for employees.
In this webinar, we’re having a conversation about cybersecurity in a practical way. The bad guys want to trick employees, so we’ll talk about ways to avoid falling victim to cybercrime.
What you’ll learn:
Good password habits
How to share files securely
What ransomware is and how to prevent it
Why hackers use phishing, vishing, and social engineering to launch cyber attacks
What to be aware of when browsing the internet
What to do when you think something is suspicious
Meet our guests:
Rob Witteman, Project Lead at WorkSmart
With 8 years’ experience working in managed IT services, Rob has helped many small businesses strengthen their security.
As WorkSmart’s Onboarding Project Lead, Rob works on new client onboarding projects to ensure a successful start to their partnership with WorkSmart, including making sure that their cybersecurity is up to par.
By incorporating quickly-evolving cybersecurity practices into IT strategy plans, Rob helps small businesses reach their fullest potential, while also keeping them secure.
John Jarvis, Senior Business Advisor at WorkSmart
A recent addition to our Atlanta team, John has has spent the last 10 years serving companies and nonprofit organizations all across the country with his experience, creativity, and lifelong interest in technology.
John got his start at Google, where he studied technology and business analytics before going on to master discovery, scoping, and budgeting for impactful technology solutions to bring about measurable change.
In his role as Senior Business Advisor here at WorkSmart, he forges constructive relationships with new partners and identifies how WorkSmart can best help them achieve their goals.
Sam Young, Technical Support Representative
While Sam is relatively new to the world of MSPs, he’s no stranger to the ins and outs of computers. Tinkering with computers since he was a small child, Sam knows that the safest user is a well-informed one.
As a Technical Support Representative, Sam works to help our clients discern, fix and learn how to tackle their IT problems in a way that is easy to understand.
With industry standard certifications in security and networking, Sam works to not only solve any tech issues that may arise, but he also aims to prevent them from occurring in the first place by implementing proactive measures.
With emails being such a common tool for communication, both in the business world and on a personal level, phishing emails are becoming more common as well.
Check out this short video (less than 10 minutes) for some of the quickest ways to spot a phishing email, and what to do if you receive one.
The core of WorkSmart consists of our people. By demonstrating our core values (doing the right thing, being curious, and building personal connections), our team is able to consistently support each other and all of our clients in reaching their fullest potential.
Join us in congratulating the following group of folks as they celebrate their work anniversaries. We appreciate them all!
In today’s world, the phrase “the cloud” appears pretty regularly. But, do you actually know what it means? Or how the cloud can benefit your business? Check out Marissa’s quick explanation on what is the cloud. Oh, and in under 60 seconds.
Strong passwords help prevent unauthorized access and potential data breaches. But what makes a password strong? Here are our top password tips to help you protect your data.