email | TechSolutions, Inc. Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation. Thu, 27 Apr 2023 03:41:17 +0000 en-US hourly 1 https://www.techsolutionsinc.com/wp-content/uploads/2020/05/favicon.png email | TechSolutions, Inc. 32 32 Gmail: Manage your emails better with these 5 simple tricks https://www.techsolutionsinc.com/blog/gmail-manage-your-emails-better-with-these-5-simple-tricks/ https://www.techsolutionsinc.com/blog/gmail-manage-your-emails-better-with-these-5-simple-tricks/#respond Sat, 18 Sep 2021 00:00:14 +0000 https://www.techsolutionsinc.com/blog/gmail-manage-your-emails-better-with-these-5-simple-tricks/ Security, ease of use, and free service are just some of the main reasons why many businesses use Gmail. But despite the email service’s ubiquity, there are still plenty of ways for users to improve their Gmail experience. Gain better control over your inbox — and your workday — with these tricks. Undo Send In […]

The post Gmail: Manage your emails better with these 5 simple tricks appeared first on TechSolutions, Inc..

]]>

Security, ease of use, and free service are just some of the main reasons why many businesses use Gmail. But despite the email service’s ubiquity, there are still plenty of ways for users to improve their Gmail experience. Gain better control over your inbox — and your workday — with these tricks.

Undo Send

In the fast-paced world of business, mistakes happen. And because everybody deserves a second chance at writing that email, Gmail has provided a way to recall sent emails — as long as you do it immediately after hitting Send.

To rescind your email, simply click on Undo or View Message > Undo beside the “Message Sent” prompt at the bottom left of your screen.

Gmail templates

Gmail templates, formerly known as canned responses, are pre-written email formats that you can use as is or as the starting point of a fresh email. These are great for regular messages that follow a specific template. Instead of writing the same lines of text over and over again, you can simply choose any of the customizable templates with a few clicks.

Make sure the feature is enabled by clicking on the gear icon at the top-right corner of the screen and then See all settings. Go to the Advanced tab, and select Enable in the Templates section before clicking the Save Changes button at the bottom.

Once this feature is enabled, you can access your Gmail templates by composing a new email and clicking Templates > Insert Template.

Send large attachments with Google Drive

Need to send a high-resolution RAW image to a client but Gmail’s attachment size restrictions won’t let you? You can simply upload your files to Google Drive and click on Share to get a sharing link you can send to your client or your boss.

Alternatively, you can click on the Google Drive icon at the bottom of your email composition window and choose the files you wish to send.

Turn on Priority Inbox

The Priority Inbox feature organizes your messages by importance using machine learning. You’ll be able to divide your inbox into five categories, where the messages will be displayed in the following order:

  1. Important and unread messages
  2. Starred messages
  3. [Customizable category]
  4. [Customizable category]
  5. Everything else

Enable advanced settings

Configuring Gmail’s Advanced Settings is an excellent way to increase email efficiency. Some of these features include Multiple Inboxes, Preview Pane, and custom keyboard shortcuts. Access them by going to Settings > See all settings > Advanced.

Spending the right amount of time with emails while managing other crucial business areas is a balancing act many business owners find difficult. If you have questions or need further assistance regarding Gmail or IT in general, feel free to contact us.

Published with permission from TechAdvisory.org. Source.

The post Gmail: Manage your emails better with these 5 simple tricks appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/gmail-manage-your-emails-better-with-these-5-simple-tricks/feed/ 0
IT policies to protect your business https://www.techsolutionsinc.com/blog/it-policies-to-protect-your-business/ https://www.techsolutionsinc.com/blog/it-policies-to-protect-your-business/#respond Tue, 24 Jul 2018 00:00:40 +0000 https://www.techsolutionsinc.com/blog/it-policies-to-protect-your-business/ Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we’ve suggested a few IT policies you should implement to protect your business. Internet In today’s business world, […]

The post IT policies to protect your business appeared first on TechSolutions, Inc..

]]>

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we’ve suggested a few IT policies you should implement to protect your business.

Internet

In today’s business world, employees spend a lot of time on the internet. To ensure they’re not putting your business at risk, you need a clear set of web policies. This must limit internet use for business purposes only, prohibit unauthorized downloads, and restrict access to personal emails on company devices. You can also include recommended browsing practices and policies for using business devices on public wifi.

Email

Just like the Internet policy mentioned above, company email accounts should only be utilized for business use. That means your employees should never use it to send personal files, forward links, or perform any type of business-related activities outside their specific job role. Additionally, consider implementing a standard email signature for all employees. This not only creates brand cohesion on all outgoing emails, but also makes it easy to identify messages from other employees, thus preventing spear phishing.

Passwords

We’ve all heard the importance of a strong password time and time again. And this same principle should also apply to your employees. The reason is rather simple. Many employees will create the easiest to crack passwords for their business accounts. After all, if your organization gets hacked, it’s not their money or business at stake. So to encourage employees to create strong passwords, your policy should instruct them to include special characters, uppercase and lowercase letters, and numbers in their passwords.

Data

Whether or not you allow your employees to conduct work on their own devices, such as a smartphone or tablet, it is important to have a bring your own device (BYOD) policy. If your employees aren’t aware of your stance on BYOD, some are sure to assume they can conduct work-related tasks on their personal laptop or tablet. So have a BYOD policy and put it in the employee handbook. In addition to this, make sure to explain that data on any workstation is business property. This means employees aren’t allowed to remove or copy it without your authorization.

We hope these four policies shed some light on the industry’s best security practices. If you’d like more tips or are interested in a security audit of your business, give us a call.

Published with permission from TechAdvisory.org. Source.

The post IT policies to protect your business appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/it-policies-to-protect-your-business/feed/ 0
Outlook update enhances user experience https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/ https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/#respond Tue, 01 Nov 2016 00:00:17 +0000 https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/ As far as communication goes, there are numerous factors to consider, especially when that communication is done online rather than in person. Since its inception, Microsoft Outlook has always been an excellent communication tool. And now, with its recent update, it can do an even better job at helping people communicate with one another quickly […]

The post Outlook update enhances user experience appeared first on TechSolutions, Inc..

]]>

2016october31_office_aAs far as communication goes, there are numerous factors to consider, especially when that communication is done online rather than in person. Since its inception, Microsoft Outlook has always been an excellent communication tool. And now, with its recent update, it can do an even better job at helping people communicate with one another quickly and easily. Learn and take advantage of the changes that Outlook’s update makes to the user experience.

Improved Contact Cards
One of the most welcome changes with the Outlook update is that the concept of the Contact Card has been greatly improved upon. In previous manifestations of Outlook, the information about contacts that was quickly available was limited to basic information such as name, phone number, and email address. With the new Outlook, Contact Cards can contain a person’s job title, their relationship to you, and what your most recent communications were so that you can better remember who you are talking to and what you were talking about.

Smarter Search Features
Searching contacts, emails, and other features of Outlook is easier with the latest update. Search features are now smarter in that they can go off of the first letter you type and retrieve your most frequent search requests starting with that letter. This speeds up searching and helps retrieve relevant information in seconds, not minutes.

People Section Enhancements
Outlook has also made some major improvements and enhancements to the ‘main people’ section of Outlook. You can now create smart lists of people based on common features. This will include your most frequently contacted people, groups based on job titles or departments, favorites, and those who need follow-up. These lists makes sending group emails to relevant contacts much simpler because you don’t have to scour all your contacts to find the right people.

Now that you know some of the ways that Outlook has changed the user experience with its latest updates, you can begin to put these to use in your business. Contact us to help you navigate those changes and put the benefits to use in your business and personal communications.

Published with permission from TechAdvisory.org. Source.

The post Outlook update enhances user experience appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/outlook-update-enhances-user-experience/feed/ 0
Spoofed email takes down NBA team https://www.techsolutionsinc.com/blog/spoofed-email-takes-down-nba-team/ https://www.techsolutionsinc.com/blog/spoofed-email-takes-down-nba-team/#respond Tue, 21 Jun 2016 00:00:58 +0000 https://www.techsolutionsinc.com/blog/spoofed-email-takes-down-nba-team/ The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the Milwaukee Bucks fell victim to a spoofed email scam last month. Names, addresses, Social Security numbers, compensation information and dates of birth of the players were unknowingly sent to a hacker and created a massive […]

The post Spoofed email takes down NBA team appeared first on TechSolutions, Inc..

]]>

b

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the Milwaukee Bucks fell victim to a spoofed email scam last month. Names, addresses, Social Security numbers, compensation information and dates of birth of the players were unknowingly sent to a hacker and created a massive security issue for the team. And just because your employees don’t make millions of dollars doesn’t mean hackers won’t target your company. Here are four ways to protect yourself from spoofed emails.

Education is key
There are countless cliches out there promoting the importance of education, but when it comes to cyber security, you might as well embrace them all. In the case of spoofed emails, you need to make sure your employees know what these are and how they can harm your company. They can come in several forms and look to attack your organization in a number of different ways. A good defense starts with trained employees using best security practices when it comes to emails. Knowledge isn’t just the key to success, it’s the building block of a comprehensive email security plan.

Check the sender
The easiest way to determine a real email from a spoofed one is to view who is sending it. While your basic junk mail folder will screen the really lazy attempts at spoofing, you and your employees can’t rely on it to weed out everything. A lot of cybercriminals have gotten skilled at mimicking the look and feel of companies through professional looking graphics and signatures. For starters, you are going to want to ignore email display names as these can be deceptive. The domain name provides the best clues as to who the sender really is. For instance, if an email requesting your company’s financial documents claims to be from the IRS but the domain reads IRSgov.com, it’s a spoof email since that domain is not what the IRS uses. If you ever spot an email containing a domain you consider to be suspicious, delete it immediately. If it is from a legitimate sender, they will send you a follow up email in a couple of days.

Embrace DMARC
Domain-based Message Authentication, Reporting and Conformance (DMARC) can help reduce the risk of spoofed emails being sent internally. For businesses that do not set this up, it is possible for someone to spoof an email account that looks like it is from your business or a current employee and send it from a different server. As we saw in the case with the Bucks, these can appear legitimate to employees who will then in turn do what is requested such as turn off security settings or handover sensitive data. With DMARC in place you can prevent spoofed emails from utilizing your domains by requiring any email sent by your domain to come from your server. This greatly reduces the risk of an internal spoofed email showing up in the inbox of your employees.

Utilize email protections
A lot of companies believe they can get by with the simple protections that come standard with an email client. However, doing the bare minimum is rarely enough to stop spoofed emails, not to mention all of the other threats lurking in your inbox, and high-powered email and spam protection will give your organization the added layer of security it needs. Much like elite-level basketball players need the best coaching and equipment to succeed, the only way to truly reduce the risk of falling victim of a spoofed email is to educate your staff properly and then equip them with email filtering. This ensures they aren’t wasting their time constantly trying to identify legitimate emails from fake ones but are prepared when the situation presents itself.

When it comes to email security, working with us is a slam dunk. We may not have the skills of Steph Curry on the basketball court but when in the realm of IT, competitors say they want to be like us. Give us a call today to find out more.

Published with permission from TechAdvisory.org. Source.

The post Spoofed email takes down NBA team appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/spoofed-email-takes-down-nba-team/feed/ 0
IT Security Policies you need to implement https://www.techsolutionsinc.com/blog/it-security-policies-you-need-to-implement/ https://www.techsolutionsinc.com/blog/it-security-policies-you-need-to-implement/#respond Wed, 10 Feb 2016 02:00:02 +0000 https://www.techsolutionsinc.com/blog/it-security-policies-you-need-to-implement/ Most business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the most common causes of a […]

The post IT Security Policies you need to implement appeared first on TechSolutions, Inc..

]]>

2016Feb9_Security_AMost business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the most common causes of a security breach, it is incredibly vital that your staff is informed of your policies. Here are four policies that every business owner should share with their employees.

Internet

In today’s business world, employees spend a lot of time on the Internet. To ensure they’re not putting your business at risk, you need a clear set of web policies. Here are three important ones to keep in mind:

  1. Employees should be using the Internet for business purposes only. While this is undoubtedly hard to avoid without blocking specific websites, having a policy in place should at least cut back on employees spending time on non-business related sites.
  2. Prohibit unauthorized downloads. This includes everything from music to games, and even data or applications.
  3. Accessing personal email should not be done on business devices. If employees must access their own email account during the day, they can do so on their smartphone or other personal device.

These are just a few Internet policies to get started, but you should also consider including information on your recommended browsing practices and your policies for using business devices (such as company phones) on public wifi.

Email

Just like with the Internet policy mentioned above, company email accounts should only be utilized for business use. That means your employees should never use it to send personal files, forward links or perform any type of business-related activities outside of their specific job role. Additionally, consider implementing a standard email signature for all employees. This not only creates brand cohesion on all outgoing emails, but also makes it easy to identify messages from other employees, and hence helps prevents spear phishing.

Passwords

We’ve all heard the importance of a strong password time and time again. And this same principle should also apply to your employees. The reason is rather simple. Many employees will create the easiest to crack passwords for their business accounts. After all, if your organization gets hacked, it’s not their money or business at stake. So to encourage employees to create strong passwords, your policy should instruct them to include special characters, uppercase and lowercase letters, and numbers in their passwords.

Data

Whether or not you allow your employees to conduct work on their own device, such as a smartphone or tablet, it is important to have a bring your own device (BYOD) policy. If your employees aren’t aware of your stance on BYOD, some are sure to assume they can conduct work related tasks on their personal laptop or tablet. So have a BYOD policy and put it in the employee handbook. In addition to this, make sure to explain that data on any workstation is business property. That means employees aren’t allowed to remove or copy it without your authorization.

We hope these four policies have shed some light on best security practices. If you’d like more tips or are interested in a security audit of your business, do get in touch.

Published with permission from TechAdvisory.org. Source.

The post IT Security Policies you need to implement appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/it-security-policies-you-need-to-implement/feed/ 0