Aldridge Blog

Quick reads to improve your IT strategy

Most Recent Posts

SOC & SIEM Explained

Businesses of all sizes are vulnerable to cyber threats. To mitigate these risks, organizations rely on a Security Operations Center (SOC) and Security Information and Event Management (SIEM) system.   What is SOC?  A Security Operations Center (SOC) is a centralized...

read more
How to Use “IF” Functions in Excel

How to Use “IF” Functions in Excel

The IF function is one of the most popular functions in Excel, and it allows you to make logical comparisons between a value and what you expect.  How to Use “IF” Functions in Excel IF Function - Syntax and Usage  The IF function is one of Excel's logical functions...

How To Join a Microsoft Teams Meeting

Teams is Microsoft's communication and collaboration platform. One of Teams' most valuable features is it's video conferencing capability. Whether you're trying to talk to people within your organization or external people, setting up meetings and calls using Teams is...

How to Build a Cybersecurity Strategy

Building an effective security strategy isn’t something that can happen overnight. It requires careful thought and an iterative process you are always refining. Below, we outline three steps you can work through to help identify your exposure and your current security...

Why Log4j is a Threat that Won’t Go Away

You may have heard about Log4j earlier this year. It was a big enough deal that it received coverage on mainstream news sites. Log4j refers to a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity...

7 Password Security Best Practices

Cybersecurity can be thought of like home security. You can implement the latest and greatest security technology, but none of that will stop an intruder if you leave your keys out in the open. Your corporate credentials can be thought of as keys to your business. An...

3 Major Benefits of Microsoft 365 Business Premium

Microsoft 365 Business Premium is our recommended Microsoft 365 subscription plan for any professional organization. The value you receive for just $10 per user/per month over Business Standard is too good to pass up, especially for businesses that value security....

It Security

DIY vs. Managed Security: Choosing the Right Option for Your SMB

In today's digital landscape, safeguarding your business from cyber threats is paramount, especially for small and medium-sized businesses (SMBs). With the rise in cyber attacks targeting organizations of all sizes, finding the right security solution is critical for...

Microsoft 365

SharePoint in 30 Minutes – Part 3: Features and Collaboration

  Video Transcription Now that we have our first document created, let me show you some of the actions that you can take on that document. If you'll notice, there's a ribbon up at the top with some quick actions that you can take. We've already used the "new"...

SharePoint in 30 Minutes – Part 1: Search Basics

  Video Transcription As we learned in the first video, files are stored in folders which are contained inside of libraries, inside of your company's SharePoint site. You're probably accustomed to searching for files on a traditional network share, so let's show...

It Consulting

How To Use Flash Fill in Excel

Flash Fill is like a data assistant that finishes your work for you. As soon as it detects what you want to do, Flash Fill enters the rest of your data in one fell swoop, following the pattern it recognizes in your data.  How To Use Flash Fill in Excel Here’s an...

How to Use “IF” Functions in Excel

The IF function is one of the most popular functions in Excel, and it allows you to make logical comparisons between a value and what you expect.  How to Use “IF” Functions in Excel IF Function - Syntax and Usage  The IF function is one of Excel's logical functions...

Don’t Miss Our Most Popular Articles

DIY vs. Managed Security: Choosing the Right Option for Your SMB

DIY vs. Managed Security: Choosing the Right Option for Your SMB

In today's digital landscape, safeguarding your business from cyber threats is paramount, especially for small and medium-sized businesses (SMBs). With the rise in cyber attacks targeting organizations of all sizes, finding the right security solution is critical for...