Aldridge Blog
Quick reads to improve your IT strategy
Most Recent Posts
Why Choose Aldridge for Managed IT Services and Cybersecurity?
Choosing the right partner to manage your technology and protect your business is a very important decision. You rely on your technology to deliver services to your clients, and you need to trust your client’s data is safe. At Aldridge, we’ve spent the last 40 years...
The Cost of a Security Breach for Long-Term Care Providers
You know who loves sensitive resident data? Cybercriminals. Unfortunately, long-term care facilities are like their favorite store to shoplift from. Because long-term care facilities possess sensitive resident data, they are prime targets. Regulatory fines on top of...
3 Top Complaints Long-Term Care Providers Have About Their IT
One of the top complaints long-term care providers have about their IT systems is poor usability. Providers need IT systems that are easy to use, intuitive, and can help streamline their workflows. Unfortunately, many IT systems in long-term care are overly complex...
[Webinar] Cyber Insurance: Getting The Right Coverage & Preparing for Change
The threat landscape is evolving and cyber insurance carriers are scrambling to catch up. In this webinar, IT Security and cyber insurance experts from Aldridge and FifthWall Solutions will talk you through a brief history of the cyber insurance industry so you can...
How To Join a Microsoft Teams Meeting
Teams is Microsoft's communication and collaboration platform. One of Teams' most valuable features is it's video conferencing capability. Whether you're trying to talk to people within your organization or external people, setting up meetings and calls using Teams is...
How to Build a Cybersecurity Strategy
Building an effective security strategy isn’t something that can happen overnight. It requires careful thought and an iterative process you are always refining. Below, we outline three steps you can work through to help identify your exposure and your current security...
Why Log4j is a Threat that Won’t Go Away
You may have heard about Log4j earlier this year. It was a big enough deal that it received coverage on mainstream news sites. Log4j refers to a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity...
7 Password Security Best Practices
Cybersecurity can be thought of like home security. You can implement the latest and greatest security technology, but none of that will stop an intruder if you leave your keys out in the open. Your corporate credentials can be thought of as keys to your business. An...
3 Major Benefits of Microsoft 365 Business Premium
Microsoft 365 Business Premium is our recommended Microsoft 365 subscription plan for any professional organization. The value you receive for just $10 per user/per month over Business Standard is too good to pass up, especially for businesses that value security....
Microsoft 365 Business Standard vs Premium
Microsoft 365 has established itself as the best-in-class productivity and collaboration platform for businesses. Microsoft 365 offers 4 different subscription tiers, however there are really only 2 tiers that are suitable for professional organizations of up to 300...
It Security
Defending Against Volt Typhoon: China’s State-Sponsored Cyberattack Group
Threat actors are employing increasingly sophisticated tactics to damage and disrupt US businesses and critical infrastructure. One of these major threat groups is the Chinese state-sponsored cyberattack team "Volt Typhoon" (source). First identified in 2023, Volt...
[Webinar] Prepare, Respond, & Recover | Take Control of Your Cyber Risk
Our expert panelists from Aldridge, Buchanan, and Higginbotham have worked with 100’s of businesses affected by cybercrime. They want to share what they’ve learned so that you understand today’s threats and how to effectively protect yourself and your business. Get an...
Microsoft Loop: Unlock Seamless Collaboration
Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...
Microsoft 365
SharePoint in 30 Minutes – Part 3: Features and Collaboration
Video Transcription Now that we have our first document created, let me show you some of the actions that you can take on that document. If you'll notice, there's a ribbon up at the top with some quick actions that you can take. We've already used the "new"...
SharePoint in 30 Minutes – Part 2: New Documents in SharePoint Online
Video Transcription I'm going to create a new folder here first so I can create that document inside of it. I click on new and then folder. Then, I give that folder a name. You can see that the folder "Test" is created inside of this library. Now, if I want to...
SharePoint in 30 Minutes – Part 1: Search Basics
Video Transcription As we learned in the first video, files are stored in folders which are contained inside of libraries, inside of your company's SharePoint site. You're probably accustomed to searching for files on a traditional network share, so let's show...
It Consulting
How to Use “IF” Functions in Excel
The IF function is one of the most popular functions in Excel, and it allows you to make logical comparisons between a value and what you expect. How to Use “IF” Functions in Excel IF Function - Syntax and Usage The IF function is one of Excel's logical functions...
The Cost of a Security Breach for Long-Term Care Providers
You know who loves sensitive resident data? Cybercriminals. Unfortunately, long-term care facilities are like their favorite store to shoplift from. Because long-term care facilities possess sensitive resident data, they are prime targets. Regulatory fines on top of...
Don’t Miss Our Most Popular Articles
Defending Against Volt Typhoon: China’s State-Sponsored Cyberattack Group
Threat actors are employing increasingly sophisticated tactics to damage and disrupt US businesses and critical infrastructure. One of these major threat groups is the Chinese state-sponsored cyberattack team "Volt Typhoon" (source). First identified in 2023, Volt...
[Webinar] Prepare, Respond, & Recover | Take Control of Your Cyber Risk
Our expert panelists from Aldridge, Buchanan, and Higginbotham have worked with 100’s of businesses affected by cybercrime. They want to share what they’ve learned so that you understand today’s threats and how to effectively protect yourself and your business. Get an...
Microsoft Loop: Unlock Seamless Collaboration
Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...