Aldridge Blog
Quick reads to improve your IT strategy
Most Recent Posts
SOC (Security Operations Center) & NOC (Network Operations Center): What’s the Difference?
As businesses grow, so do the complexities of managing and securing their networks. Two crucial components that play a role in this process are the Network Operations Center (NOC) and the Security Operations Center (SOC). What is a NOC (Network Operations Center)? ...
Trending Threat: Live off the Land (LOTL) Attacks
Cybersecurity has significantly evolved over the past decade. Five to ten years ago, the primary focus was on antivirus software and protecting against malicious software intrusions. While these measures remain crucial components of a layered security approach, the...
How Executives Should Adapt to the New Security Landscape
It’s crucial to recognize that the IT world we operate in has changed and is a new security landscape. This shift isn't exclusive to cybersecurity providers; it encompasses every business across various industries. Whether you're dealing with customers, vendors, or...
Microsoft 365 For Business: Picking The Right Plan
Microsoft 365 is Microsoft’s modern solution for business productivity, communication, collaboration, and security. There are multiple tiers of Microsoft 365 For Business, intended to suit the diverse needs of different businesses. This article will give you an...
How Do Criminals Plan and Execute Cyber Attacks?
By now, you most likely know there has been an increase in the number of cyberattacks on small and midsized businesses, but you may not know the level of sophistication many cybercriminals have when it comes to planning and executing attacks. We break down the...
Top 4 Cyberthreats Facing Businesses
With more people working from home or in hybrid situations, employees are more vulnerable than ever to cyberattacks. From using personal devices and public wifi to lack of security awareness, it’s more important than ever for you and your team to understand the...
How A Business Email Compromise Happens
If you get caught in a business email compromise, the process can start a new string of related attacks on your associates, partners, customers, and vendors. Financial fraud, relationship exploits, ransomware, and business disruption are all likely outcomes of an...
Understanding External Vulnerability Scans
Hackers continue to evolve their attack methods to take advantage of weaknesses in the external network of governments and organizations around the globe. External vulnerability scans check the surface area your network presents to the world and the larger internet....
Understanding Internal Vulnerability Scans
Cyberthreats evolve as hackers hunt for potential vulnerabilities they can exploit, such as unpatched software running on a user's laptop or poorly implemented security controls. As new vulnerabilities are discovered, cybercriminals evolve their attacks to target...
9 Signs You’re Not Getting the IT Support You Need
Businesses today need more than just a help desk from their IT outsourcing provider. At a minimum, your IT support provider should keep things running, but it takes more than functional IT to get your business where you want it to go. What your business really needs...
It Security
Microsoft Copilot 365 | Which Plan is Right for You?
Microsoft Copilot 365 is now available to all businesses! There are multiple tiers of copilot, here is what they are, how much they cost, and how to use them. Microsoft Copilot for Business Use Copilot Congratulations! If you're using Microsoft 365 with an Entra ID...
Essential Cybersecurity Solutions for Businesses
The surge in cyber threats has elevated cybersecurity to a critical business priority. As organizations increasingly rely on digital infrastructure, safeguarding sensitive information and ensuring the uninterrupted flow of operations become necessary. Essential...
[Webinar] 2024 AI Update | Lessons Learned from Our AI Journey
Aldridge CIO, Chad Hiatt gives a candid update on our project to implement AI across our business. We’ve reached our first project milestone and things have not gone as we anticipated. We want to share our AI journey, warts and all, because we believe that everyone...
Microsoft 365
SharePoint in 30 Minutes – Part 4: Recover and Restore Documents
Video Transcription If you need to recover a deleted file from anywhere in SharePoint, regardless of who the changes or who deleted the file, you can do this from the recycle bin located in the left navigation menu. Once here, you can see information about a...
SharePoint in 30 Minutes – Part 3: Features and Collaboration
Video Transcription Now that we have our first document created, let me show you some of the actions that you can take on that document. If you'll notice, there's a ribbon up at the top with some quick actions that you can take. We've already used the "new"...
SharePoint in 30 Minutes – Part 2: New Documents in SharePoint Online
Video Transcription I'm going to create a new folder here first so I can create that document inside of it. I click on new and then folder. Then, I give that folder a name. You can see that the folder "Test" is created inside of this library. Now, if I want to...
It Consulting
[Webinar] Microsoft Excel: Beyond the Basics
Watch the training to learn advanced Microsoft Excel techniques and best practices. You’ll get a quick overview of Excel’s advanced features and common business use cases. No matter what your experience with Excel is, you’ll leave this training with something new....
Trending Threat: Live off the Land (LOTL) Attacks
Cybersecurity has significantly evolved over the past decade. Five to ten years ago, the primary focus was on antivirus software and protecting against malicious software intrusions. While these measures remain crucial components of a layered security approach, the...
Don’t Miss Our Most Popular Articles
Microsoft Copilot 365 | Which Plan is Right for You?
Microsoft Copilot 365 is now available to all businesses! There are multiple tiers of copilot, here is what they are, how much they cost, and how to use them. Microsoft Copilot for Business Use Copilot Congratulations! If you're using Microsoft 365 with an Entra ID...
Essential Cybersecurity Solutions for Businesses
The surge in cyber threats has elevated cybersecurity to a critical business priority. As organizations increasingly rely on digital infrastructure, safeguarding sensitive information and ensuring the uninterrupted flow of operations become necessary. Essential...
[Webinar] 2024 AI Update | Lessons Learned from Our AI Journey
Aldridge CIO, Chad Hiatt gives a candid update on our project to implement AI across our business. We’ve reached our first project milestone and things have not gone as we anticipated. We want to share our AI journey, warts and all, because we believe that everyone...