Resources

microsoft 365
information

Microsoft 365 Information

Can Ransomware Be Stopped?

Throughout 2021, hackers and ransomware gangs targeted companies running networks like the Colonial Pipeline fuel system, with greater tenacity.

How to Nurture a Culture of Cybersecurity in Your Organization?

The number of cyberattacks reported in the recent past is a clear indicator that hackers are working around the clock. More importantly, they are devising more sophisticated techniques to get through systems that would otherwise be hard to hack. The recent Kayesa VSA, JBS, and Colonial Pipeline attacks are excellent examples.

Reasons Law Firms Need Microsoft 365

Microsoft has been in the thick of those technology changes in law firm practice because Microsoft’s software products, such as Office 365, run on every computer and mobile device.

Top 7 Apps To Measure Productivity

There is no shortcut to productivity. We live at a time when success in any endeavor will only come as a result of intelligent planning, applying consistent effort, and commitment to excel.

Ransomware Cyberattacks on Large Companies at Record Highs

Ransomware cyberattacks on large corporations are becoming more common and crippling. What’s more worrying is that many targeted organizations don’t have the capacity or measures to proactively detect and prevent different cyber threats or fix a vulnerability faster to avoid further losses. 

Intelice Multi Factor Authentication Information

Over the last serval years, we have seen attacks on our customers grow exponentially, to the point that today we have a breach reported with 1 out of every 10 of our clients through fraudulent sign-ins each month.

What is Multi-Factor Authentication?

Multi-Factor Authentication (MFA) refers to an additional layer of security added to the login process. MFA relies on two forms of authentication: something you know and something you have with you.

The Role of Cloud Desktops in Small and Medium-Sized Businesses

The Role of Cloud Desktops in Small and Medium-Sized Businesses In this day and age, it is quite impossible to find a business that does not rely on IT for operations. Sure, that small coffee down the corner looks as rustic as old businesses go but behind that is a...

Assessing Your Digital Risks

You hear about data breaches and identity theft every single day. Don’t make the mistake of assuming it’s all being exaggerated to get your attention.

Microsoft ERP Branding
A Quick & Easy Guide

Unsure what the difference is between Dynamics NAV and Dynamics CRM? Check out this guide to make sure you’re considering the right Microsoft business application for your organization. 

Budgeting For CMMC In 2021

The Department of Defense (DoD) has issued their much-anticipated interim rule, which has put all contractors on the clock — by November 30, 2020, you will need to comply with the National Institute of Standards and Technology (NIST) Assessment methodology. 

Are You Missing Out On Microsoft Azure?

Are you lost in the cloud? The cloud is one of the biggest technological industries worldwide — public cloud adoption is at 91% and private cloud adoption is at 72% as of 2019.

What Is PCI Compliance?

PCI is an information security standard for businesses that accept or handle card payments. It aims at safeguarding the integrity and privacy of cardholder information during processing, storage, and transmission.

What Is CMMC?

CMMC is the DOD’s way of certifying its contractors’ abilities to protect the Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) shared within the supply chain.

What Exactly Is NIST?

What exactly is NIST? Intelice breaks down what NIST actually is and how NIST can benefit your organization. Discover more here.

Unlocking the Power of Your Business Software

In 2020, companies are expected to spend $426 billion on enterprise software. One of the most important ways to make those dollars count is to maximize the use of it and to consistently investigate ways to improve, or even automate, as many business processes as possible. 

Sales Tax Compliance Pains

Sales tax compliance has become more demanding for companies that sell products across state lines due to the South Dakota v. Wayfair Inc. Supreme Court decision in 2018. That decision changed the rules for sales and use tax for companies selling online and offline.

microsoft business
central information

Microsoft Business Central Information

Can Ransomware Be Stopped?

Throughout 2021, hackers and ransomware gangs targeted companies running networks like the Colonial Pipeline fuel system, with greater tenacity.

How to Nurture a Culture of Cybersecurity in Your Organization?

The number of cyberattacks reported in the recent past is a clear indicator that hackers are working around the clock. More importantly, they are devising more sophisticated techniques to get through systems that would otherwise be hard to hack. The recent Kayesa VSA, JBS, and Colonial Pipeline attacks are excellent examples.

Reasons Law Firms Need Microsoft 365

Microsoft has been in the thick of those technology changes in law firm practice because Microsoft’s software products, such as Office 365, run on every computer and mobile device.

Top 7 Apps To Measure Productivity

There is no shortcut to productivity. We live at a time when success in any endeavor will only come as a result of intelligent planning, applying consistent effort, and commitment to excel.

Ransomware Cyberattacks on Large Companies at Record Highs

Ransomware cyberattacks on large corporations are becoming more common and crippling. What’s more worrying is that many targeted organizations don’t have the capacity or measures to proactively detect and prevent different cyber threats or fix a vulnerability faster to avoid further losses. 

Intelice Multi Factor Authentication Information

Over the last serval years, we have seen attacks on our customers grow exponentially, to the point that today we have a breach reported with 1 out of every 10 of our clients through fraudulent sign-ins each month.

What is Multi-Factor Authentication?

Multi-Factor Authentication (MFA) refers to an additional layer of security added to the login process. MFA relies on two forms of authentication: something you know and something you have with you.

The Role of Cloud Desktops in Small and Medium-Sized Businesses

The Role of Cloud Desktops in Small and Medium-Sized Businesses In this day and age, it is quite impossible to find a business that does not rely on IT for operations. Sure, that small coffee down the corner looks as rustic as old businesses go but behind that is a...

Assessing Your Digital Risks

You hear about data breaches and identity theft every single day. Don’t make the mistake of assuming it’s all being exaggerated to get your attention.

Microsoft ERP Branding
A Quick & Easy Guide

Unsure what the difference is between Dynamics NAV and Dynamics CRM? Check out this guide to make sure you’re considering the right Microsoft business application for your organization. 

Budgeting For CMMC In 2021

The Department of Defense (DoD) has issued their much-anticipated interim rule, which has put all contractors on the clock — by November 30, 2020, you will need to comply with the National Institute of Standards and Technology (NIST) Assessment methodology. 

Are You Missing Out On Microsoft Azure?

Are you lost in the cloud? The cloud is one of the biggest technological industries worldwide — public cloud adoption is at 91% and private cloud adoption is at 72% as of 2019.

What Is PCI Compliance?

PCI is an information security standard for businesses that accept or handle card payments. It aims at safeguarding the integrity and privacy of cardholder information during processing, storage, and transmission.

What Is CMMC?

CMMC is the DOD’s way of certifying its contractors’ abilities to protect the Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) shared within the supply chain.

What Exactly Is NIST?

What exactly is NIST? Intelice breaks down what NIST actually is and how NIST can benefit your organization. Discover more here.

Unlocking the Power of Your Business Software

In 2020, companies are expected to spend $426 billion on enterprise software. One of the most important ways to make those dollars count is to maximize the use of it and to consistently investigate ways to improve, or even automate, as many business processes as possible. 

Sales Tax Compliance Pains

Sales tax compliance has become more demanding for companies that sell products across state lines due to the South Dakota v. Wayfair Inc. Supreme Court decision in 2018. That decision changed the rules for sales and use tax for companies selling online and offline.

Why Washington Area Businesses Must Have ADA Compliant Websites

The Americans with Disabilities Act (ADA) ensures equal accessibility for persons with disabilities in commercial premises. In addition, ADA regulates online spaces by compelling businesses to improve accessibility for all internet users. Complying with these requirements is a critical part of developing a website or app for your Washington area business.

Upgrade Tips From GP or NAV to Microsoft Business Central

Microsoft Dynamics 365 Business Central is attracting an ever-increasing number of businesses looking to take advantage of its advanced features. The premium enterprise resource planning (ERP) tool provides an impressive user experience. Organizations gain access to an ERP system with exceptional integration and artificial intelligence (AI) capabilities.

Schedule Meetings Easily With Microsoft FindTime

There’s nothing more frustrating than trying to schedule a meeting and waiting for each person involved to get back to you – only to find out the day and time you’ve suggested doesn’t work.

Microsoft Dynamics 365 Business Central Upgrade

The Microsoft Dynamics 365 Business Central platform with Navision at its core has over 30 successful years of history backing it up with continuous improvements to the features and functionalities included. On September 1, 2020, Microsoft’s policies will require you to upgrade to Business Central 15 or above or stay where you are, which means your inevitable upgrade will be more expensive than necessary.

Are You Aware of the New Zoom Vulnerabilities? 

Since the onset of the coronavirus, there has been an increase in businesses using Zoom videoconferencing to keep in touch with clients, suppliers, and coworkers. There has also been an exponential surge in security issues where unwanted visitors are gaining unauthorized access to Zoom meetings.

Cybercrime Skyrockets 300% Since COVID-19 Started

FBI reports a staggering increase in cybersecurity complaints coming in each and every day since the coronavirus pandemic started – from phishing attacks to phony domains to intruders on video conferences.

Microsoft Office 365 Rebranding

Microsoft is undergoing some changes, including revealing Microsoft 365 subscription plans for families, but that’s not all… On April 21, 2020, many of its Office 365-branded products will be renamed as part of what the company refers to as “natural evolution.” Let’s take a look at what’s changing, what’s staying the same, and what to expect from the rebrand.

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

How to Work Remotely During the COVID-19 Pandemic

The World is Changing Right Before Our Eyes and the COVID-19 Pandemic Has the Potential to Change the Way We All Conduct Business… Here’s How to Embrace That Change with an Efficient Remote Workforce.

Cyber Threats Target Small Tax Firms

Cyber attackers are already targeting small tax and accounting firms in 2020. Are you ready to protect your business and your clients from these scams?  

Plan The Perfect Microsoft Office 365 Migration

If you’re trying to figure whether Microsoft Office 365 is right for you, then migration should be one of your primary concerns. When it comes to a cloud-based suite like this, migrating to Office 365 from your current IT environment is no small task. Before we get to the 6 steps you should follow for a perfect Office 365 migration, let’s make sure we’re on the same page about what it actually is.

What DoD Contractors Need To Know To Be Compliant

If you’re a Department of Defense (DoD) contractor, you need to comply with a wide-arching set of guidelines related to data security. A failure to demonstrate and maintain compliance means your business is out of the running for DoD business.

Do You Know Where Your Data Is?

Your data may be “in the cloud” – but do you know what that really means? Do you know why it’s important to understand where your data is stored? How does data storage factor into security? Does this affect compliance?

Are You Prepared For The End Of Windows 7?

Living in a technology era that sees device upgrades and new products on what seems like an almost weekly basis, it’s difficult to imagine that Windows 7 has remained in play since its release in 2009.

Effects of A Data Breach on Small Business

The information that no business owner or technology director wants to hear: there’s been a data breach. These chilling words can put your brain into overdrive, trying to triage the problem before you even know the full extent of the problem. What will be the impact on customers? On staff? On vendors? Is this simply a temporary bump in the road, or will your business never truly recover?

Why Is ITSM Important For Local Business?

Having a trusted IT services management partner allows you to focus on the core growth of your business while shifting the bulk of responsibility for IT operations to your services management team. See how making this move helps local businesses thrive.

Is Having a vCIO Essential?

Are your company processes aligned with the technology you have? Have you purchased different software for different things when one software could have been used for multiple things? Do you feel there are technological gaps or challenges not being appropriately...

Facebook Finally Allows Users To Delete Sent Messages

Users of Facebook Messenger, which number over 1.2 billion people worldwide, now have a new feature that makes life a bit easier after making an “oops.” An oops is a mistake in an instant message that is immediately noticed, right after sending it, by the person who wrote it. It could be that a message includes a goofy typo. Typos are usually much easier to see right after sending a message than before sending it. This is a psychological thing.

How Advanced Data Governance Helps Manage Risk & Meet Compliance

Advanced Data Governance (or ADG) is a tool from Microsoft. Available to be used within Office 365, this tool assists businesses in meeting compliance requirements and managing risk. Most of all, it helps organize the massive amounts of data that companies are now dealing with.

Azure 101: An Easy Introduction To Microsoft Azure

Local infrastructure and extensive onsite hardware are a thing of the past – it’s time for you to go serverless. You and your team deserve a cloud platform that can be relied on to support the work you do every day – you deserve Microsoft Azure.

How To Create Org-Wide Groups in Microsoft Teams

As technology improves, so does the way professionals use their programming to increase productivity and efficiency. At one time, emails were the preferred communication between colleagues simply because it was the new form of a written message. Over time, people came...

cybersecurity
information

Cybersecurity Information

Can Ransomware Be Stopped?

Throughout 2021, hackers and ransomware gangs targeted companies running networks like the Colonial Pipeline fuel system, with greater tenacity.

How to Nurture a Culture of Cybersecurity in Your Organization?

The number of cyberattacks reported in the recent past is a clear indicator that hackers are working around the clock. More importantly, they are devising more sophisticated techniques to get through systems that would otherwise be hard to hack. The recent Kayesa VSA, JBS, and Colonial Pipeline attacks are excellent examples.

Reasons Law Firms Need Microsoft 365

Microsoft has been in the thick of those technology changes in law firm practice because Microsoft’s software products, such as Office 365, run on every computer and mobile device.

Top 7 Apps To Measure Productivity

There is no shortcut to productivity. We live at a time when success in any endeavor will only come as a result of intelligent planning, applying consistent effort, and commitment to excel.

Ransomware Cyberattacks on Large Companies at Record Highs

Ransomware cyberattacks on large corporations are becoming more common and crippling. What’s more worrying is that many targeted organizations don’t have the capacity or measures to proactively detect and prevent different cyber threats or fix a vulnerability faster to avoid further losses. 

Intelice Multi Factor Authentication Information

Over the last serval years, we have seen attacks on our customers grow exponentially, to the point that today we have a breach reported with 1 out of every 10 of our clients through fraudulent sign-ins each month.

What is Multi-Factor Authentication?

Multi-Factor Authentication (MFA) refers to an additional layer of security added to the login process. MFA relies on two forms of authentication: something you know and something you have with you.

The Role of Cloud Desktops in Small and Medium-Sized Businesses

The Role of Cloud Desktops in Small and Medium-Sized Businesses In this day and age, it is quite impossible to find a business that does not rely on IT for operations. Sure, that small coffee down the corner looks as rustic as old businesses go but behind that is a...

Assessing Your Digital Risks

You hear about data breaches and identity theft every single day. Don’t make the mistake of assuming it’s all being exaggerated to get your attention.

Microsoft ERP Branding
A Quick & Easy Guide

Unsure what the difference is between Dynamics NAV and Dynamics CRM? Check out this guide to make sure you’re considering the right Microsoft business application for your organization. 

Budgeting For CMMC In 2021

The Department of Defense (DoD) has issued their much-anticipated interim rule, which has put all contractors on the clock — by November 30, 2020, you will need to comply with the National Institute of Standards and Technology (NIST) Assessment methodology. 

Are You Missing Out On Microsoft Azure?

Are you lost in the cloud? The cloud is one of the biggest technological industries worldwide — public cloud adoption is at 91% and private cloud adoption is at 72% as of 2019.

What Is PCI Compliance?

PCI is an information security standard for businesses that accept or handle card payments. It aims at safeguarding the integrity and privacy of cardholder information during processing, storage, and transmission.

What Is CMMC?

CMMC is the DOD’s way of certifying its contractors’ abilities to protect the Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) shared within the supply chain.

What Exactly Is NIST?

What exactly is NIST? Intelice breaks down what NIST actually is and how NIST can benefit your organization. Discover more here.

Unlocking the Power of Your Business Software

In 2020, companies are expected to spend $426 billion on enterprise software. One of the most important ways to make those dollars count is to maximize the use of it and to consistently investigate ways to improve, or even automate, as many business processes as possible. 

Sales Tax Compliance Pains

Sales tax compliance has become more demanding for companies that sell products across state lines due to the South Dakota v. Wayfair Inc. Supreme Court decision in 2018. That decision changed the rules for sales and use tax for companies selling online and offline.

Why Washington Area Businesses Must Have ADA Compliant Websites

The Americans with Disabilities Act (ADA) ensures equal accessibility for persons with disabilities in commercial premises. In addition, ADA regulates online spaces by compelling businesses to improve accessibility for all internet users. Complying with these requirements is a critical part of developing a website or app for your Washington area business.

Upgrade Tips From GP or NAV to Microsoft Business Central

Microsoft Dynamics 365 Business Central is attracting an ever-increasing number of businesses looking to take advantage of its advanced features. The premium enterprise resource planning (ERP) tool provides an impressive user experience. Organizations gain access to an ERP system with exceptional integration and artificial intelligence (AI) capabilities.

Schedule Meetings Easily With Microsoft FindTime

There’s nothing more frustrating than trying to schedule a meeting and waiting for each person involved to get back to you – only to find out the day and time you’ve suggested doesn’t work.

Microsoft Dynamics 365 Business Central Upgrade

The Microsoft Dynamics 365 Business Central platform with Navision at its core has over 30 successful years of history backing it up with continuous improvements to the features and functionalities included. On September 1, 2020, Microsoft’s policies will require you to upgrade to Business Central 15 or above or stay where you are, which means your inevitable upgrade will be more expensive than necessary.

Are You Aware of the New Zoom Vulnerabilities? 

Since the onset of the coronavirus, there has been an increase in businesses using Zoom videoconferencing to keep in touch with clients, suppliers, and coworkers. There has also been an exponential surge in security issues where unwanted visitors are gaining unauthorized access to Zoom meetings.

Cybercrime Skyrockets 300% Since COVID-19 Started

FBI reports a staggering increase in cybersecurity complaints coming in each and every day since the coronavirus pandemic started – from phishing attacks to phony domains to intruders on video conferences.

Microsoft Office 365 Rebranding

Microsoft is undergoing some changes, including revealing Microsoft 365 subscription plans for families, but that’s not all… On April 21, 2020, many of its Office 365-branded products will be renamed as part of what the company refers to as “natural evolution.” Let’s take a look at what’s changing, what’s staying the same, and what to expect from the rebrand.

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

How to Work Remotely During the COVID-19 Pandemic

The World is Changing Right Before Our Eyes and the COVID-19 Pandemic Has the Potential to Change the Way We All Conduct Business… Here’s How to Embrace That Change with an Efficient Remote Workforce.

Cyber Threats Target Small Tax Firms

Cyber attackers are already targeting small tax and accounting firms in 2020. Are you ready to protect your business and your clients from these scams?  

Plan The Perfect Microsoft Office 365 Migration

If you’re trying to figure whether Microsoft Office 365 is right for you, then migration should be one of your primary concerns. When it comes to a cloud-based suite like this, migrating to Office 365 from your current IT environment is no small task. Before we get to the 6 steps you should follow for a perfect Office 365 migration, let’s make sure we’re on the same page about what it actually is.

What DoD Contractors Need To Know To Be Compliant

If you’re a Department of Defense (DoD) contractor, you need to comply with a wide-arching set of guidelines related to data security. A failure to demonstrate and maintain compliance means your business is out of the running for DoD business.

Do You Know Where Your Data Is?

Your data may be “in the cloud” – but do you know what that really means? Do you know why it’s important to understand where your data is stored? How does data storage factor into security? Does this affect compliance?

Are You Prepared For The End Of Windows 7?

Living in a technology era that sees device upgrades and new products on what seems like an almost weekly basis, it’s difficult to imagine that Windows 7 has remained in play since its release in 2009.

Effects of A Data Breach on Small Business

The information that no business owner or technology director wants to hear: there’s been a data breach. These chilling words can put your brain into overdrive, trying to triage the problem before you even know the full extent of the problem. What will be the impact on customers? On staff? On vendors? Is this simply a temporary bump in the road, or will your business never truly recover?

Why Is ITSM Important For Local Business?

Having a trusted IT services management partner allows you to focus on the core growth of your business while shifting the bulk of responsibility for IT operations to your services management team. See how making this move helps local businesses thrive.

Is Having a vCIO Essential?

Are your company processes aligned with the technology you have? Have you purchased different software for different things when one software could have been used for multiple things? Do you feel there are technological gaps or challenges not being appropriately...

Facebook Finally Allows Users To Delete Sent Messages

Users of Facebook Messenger, which number over 1.2 billion people worldwide, now have a new feature that makes life a bit easier after making an “oops.” An oops is a mistake in an instant message that is immediately noticed, right after sending it, by the person who wrote it. It could be that a message includes a goofy typo. Typos are usually much easier to see right after sending a message than before sending it. This is a psychological thing.

How Advanced Data Governance Helps Manage Risk & Meet Compliance

Advanced Data Governance (or ADG) is a tool from Microsoft. Available to be used within Office 365, this tool assists businesses in meeting compliance requirements and managing risk. Most of all, it helps organize the massive amounts of data that companies are now dealing with.

Azure 101: An Easy Introduction To Microsoft Azure

Local infrastructure and extensive onsite hardware are a thing of the past – it’s time for you to go serverless. You and your team deserve a cloud platform that can be relied on to support the work you do every day – you deserve Microsoft Azure.

How To Create Org-Wide Groups in Microsoft Teams

As technology improves, so does the way professionals use their programming to increase productivity and efficiency. At one time, emails were the preferred communication between colleagues simply because it was the new form of a written message. Over time, people came...

general technical
information

General Technical Information

Can Ransomware Be Stopped?

Throughout 2021, hackers and ransomware gangs targeted companies running networks like the Colonial Pipeline fuel system, with greater tenacity.

How to Nurture a Culture of Cybersecurity in Your Organization?

The number of cyberattacks reported in the recent past is a clear indicator that hackers are working around the clock. More importantly, they are devising more sophisticated techniques to get through systems that would otherwise be hard to hack. The recent Kayesa VSA, JBS, and Colonial Pipeline attacks are excellent examples.

Reasons Law Firms Need Microsoft 365

Microsoft has been in the thick of those technology changes in law firm practice because Microsoft’s software products, such as Office 365, run on every computer and mobile device.

Top 7 Apps To Measure Productivity

There is no shortcut to productivity. We live at a time when success in any endeavor will only come as a result of intelligent planning, applying consistent effort, and commitment to excel.

Ransomware Cyberattacks on Large Companies at Record Highs

Ransomware cyberattacks on large corporations are becoming more common and crippling. What’s more worrying is that many targeted organizations don’t have the capacity or measures to proactively detect and prevent different cyber threats or fix a vulnerability faster to avoid further losses. 

Intelice Multi Factor Authentication Information

Over the last serval years, we have seen attacks on our customers grow exponentially, to the point that today we have a breach reported with 1 out of every 10 of our clients through fraudulent sign-ins each month.

What is Multi-Factor Authentication?

Multi-Factor Authentication (MFA) refers to an additional layer of security added to the login process. MFA relies on two forms of authentication: something you know and something you have with you.

The Role of Cloud Desktops in Small and Medium-Sized Businesses

The Role of Cloud Desktops in Small and Medium-Sized Businesses In this day and age, it is quite impossible to find a business that does not rely on IT for operations. Sure, that small coffee down the corner looks as rustic as old businesses go but behind that is a...

Assessing Your Digital Risks

You hear about data breaches and identity theft every single day. Don’t make the mistake of assuming it’s all being exaggerated to get your attention.

Microsoft ERP Branding
A Quick & Easy Guide

Unsure what the difference is between Dynamics NAV and Dynamics CRM? Check out this guide to make sure you’re considering the right Microsoft business application for your organization. 

Budgeting For CMMC In 2021

The Department of Defense (DoD) has issued their much-anticipated interim rule, which has put all contractors on the clock — by November 30, 2020, you will need to comply with the National Institute of Standards and Technology (NIST) Assessment methodology. 

Are You Missing Out On Microsoft Azure?

Are you lost in the cloud? The cloud is one of the biggest technological industries worldwide — public cloud adoption is at 91% and private cloud adoption is at 72% as of 2019.

What Is PCI Compliance?

PCI is an information security standard for businesses that accept or handle card payments. It aims at safeguarding the integrity and privacy of cardholder information during processing, storage, and transmission.

What Is CMMC?

CMMC is the DOD’s way of certifying its contractors’ abilities to protect the Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) shared within the supply chain.

What Exactly Is NIST?

What exactly is NIST? Intelice breaks down what NIST actually is and how NIST can benefit your organization. Discover more here.

Unlocking the Power of Your Business Software

In 2020, companies are expected to spend $426 billion on enterprise software. One of the most important ways to make those dollars count is to maximize the use of it and to consistently investigate ways to improve, or even automate, as many business processes as possible. 

Sales Tax Compliance Pains

Sales tax compliance has become more demanding for companies that sell products across state lines due to the South Dakota v. Wayfair Inc. Supreme Court decision in 2018. That decision changed the rules for sales and use tax for companies selling online and offline.

Why Washington Area Businesses Must Have ADA Compliant Websites

The Americans with Disabilities Act (ADA) ensures equal accessibility for persons with disabilities in commercial premises. In addition, ADA regulates online spaces by compelling businesses to improve accessibility for all internet users. Complying with these requirements is a critical part of developing a website or app for your Washington area business.

Upgrade Tips From GP or NAV to Microsoft Business Central

Microsoft Dynamics 365 Business Central is attracting an ever-increasing number of businesses looking to take advantage of its advanced features. The premium enterprise resource planning (ERP) tool provides an impressive user experience. Organizations gain access to an ERP system with exceptional integration and artificial intelligence (AI) capabilities.

Schedule Meetings Easily With Microsoft FindTime

There’s nothing more frustrating than trying to schedule a meeting and waiting for each person involved to get back to you – only to find out the day and time you’ve suggested doesn’t work.

Microsoft Dynamics 365 Business Central Upgrade

The Microsoft Dynamics 365 Business Central platform with Navision at its core has over 30 successful years of history backing it up with continuous improvements to the features and functionalities included. On September 1, 2020, Microsoft’s policies will require you to upgrade to Business Central 15 or above or stay where you are, which means your inevitable upgrade will be more expensive than necessary.

Are You Aware of the New Zoom Vulnerabilities? 

Since the onset of the coronavirus, there has been an increase in businesses using Zoom videoconferencing to keep in touch with clients, suppliers, and coworkers. There has also been an exponential surge in security issues where unwanted visitors are gaining unauthorized access to Zoom meetings.

Cybercrime Skyrockets 300% Since COVID-19 Started

FBI reports a staggering increase in cybersecurity complaints coming in each and every day since the coronavirus pandemic started – from phishing attacks to phony domains to intruders on video conferences.

Microsoft Office 365 Rebranding

Microsoft is undergoing some changes, including revealing Microsoft 365 subscription plans for families, but that’s not all… On April 21, 2020, many of its Office 365-branded products will be renamed as part of what the company refers to as “natural evolution.” Let’s take a look at what’s changing, what’s staying the same, and what to expect from the rebrand.

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

How to Work Remotely During the COVID-19 Pandemic

The World is Changing Right Before Our Eyes and the COVID-19 Pandemic Has the Potential to Change the Way We All Conduct Business… Here’s How to Embrace That Change with an Efficient Remote Workforce.

Cyber Threats Target Small Tax Firms

Cyber attackers are already targeting small tax and accounting firms in 2020. Are you ready to protect your business and your clients from these scams?  

Plan The Perfect Microsoft Office 365 Migration

If you’re trying to figure whether Microsoft Office 365 is right for you, then migration should be one of your primary concerns. When it comes to a cloud-based suite like this, migrating to Office 365 from your current IT environment is no small task. Before we get to the 6 steps you should follow for a perfect Office 365 migration, let’s make sure we’re on the same page about what it actually is.

What DoD Contractors Need To Know To Be Compliant

If you’re a Department of Defense (DoD) contractor, you need to comply with a wide-arching set of guidelines related to data security. A failure to demonstrate and maintain compliance means your business is out of the running for DoD business.

Do You Know Where Your Data Is?

Your data may be “in the cloud” – but do you know what that really means? Do you know why it’s important to understand where your data is stored? How does data storage factor into security? Does this affect compliance?

Are You Prepared For The End Of Windows 7?

Living in a technology era that sees device upgrades and new products on what seems like an almost weekly basis, it’s difficult to imagine that Windows 7 has remained in play since its release in 2009.

Effects of A Data Breach on Small Business

The information that no business owner or technology director wants to hear: there’s been a data breach. These chilling words can put your brain into overdrive, trying to triage the problem before you even know the full extent of the problem. What will be the impact on customers? On staff? On vendors? Is this simply a temporary bump in the road, or will your business never truly recover?

Why Is ITSM Important For Local Business?

Having a trusted IT services management partner allows you to focus on the core growth of your business while shifting the bulk of responsibility for IT operations to your services management team. See how making this move helps local businesses thrive.

Is Having a vCIO Essential?

Are your company processes aligned with the technology you have? Have you purchased different software for different things when one software could have been used for multiple things? Do you feel there are technological gaps or challenges not being appropriately...

Facebook Finally Allows Users To Delete Sent Messages

Users of Facebook Messenger, which number over 1.2 billion people worldwide, now have a new feature that makes life a bit easier after making an “oops.” An oops is a mistake in an instant message that is immediately noticed, right after sending it, by the person who wrote it. It could be that a message includes a goofy typo. Typos are usually much easier to see right after sending a message than before sending it. This is a psychological thing.

How Advanced Data Governance Helps Manage Risk & Meet Compliance

Advanced Data Governance (or ADG) is a tool from Microsoft. Available to be used within Office 365, this tool assists businesses in meeting compliance requirements and managing risk. Most of all, it helps organize the massive amounts of data that companies are now dealing with.

Azure 101: An Easy Introduction To Microsoft Azure

Local infrastructure and extensive onsite hardware are a thing of the past – it’s time for you to go serverless. You and your team deserve a cloud platform that can be relied on to support the work you do every day – you deserve Microsoft Azure.

How To Create Org-Wide Groups in Microsoft Teams

As technology improves, so does the way professionals use their programming to increase productivity and efficiency. At one time, emails were the preferred communication between colleagues simply because it was the new form of a written message. Over time, people came...