Aldridge Blog

Quick reads to improve your IT strategy

Most Recent Posts

Microsoft Loop: Unlock Seamless Collaboration

Microsoft Loop: Unlock Seamless Collaboration

Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...

SharePoint in 30 Minutes – Part 7: Using Office Apps

  Video Transcription Let's explore what it's like to work with SharePoint but from a local Office app. Instead of using something like Word Online, we're going to actually use Word installed on a PC. In order to make sure that you can access your SharePoint...

SharePoint in 30 Minutes – Part 6: Web and Desktop Apps

  Video Transcription Let's talk about all of the apps that are available that work with SharePoint Online. To access the online versions of these applications while you're in SharePoint, you can click the application launcher in the top left of the window. This...

SharePoint in 30 Minutes – Part 5: Sharing Basics

  Video Transcription You can share documents with others in your organization as well as those outside your organization in a few simple steps. When you share documents from SharePoint, you no longer have to worry about saving and editing multiple copies of the...

It Security

Reporting Phishing Emails in Microsoft Outlook

Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...

How Cybercriminals Compromise Your Business Email

Email compromise is a clever and widespread technique used by cybercriminals to breach the security of both individuals and organizations, in fact, email compromise is the most common & costliest breach to date. Related | Email Compromise: The Most Common &...

How to Report Phishing Attacks the Right Way

The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...

Microsoft 365

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

It Consulting

Microsoft Loop: Unlock Seamless Collaboration

Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...

Don’t Miss Our Most Popular Articles

Reporting Phishing Emails in Microsoft Outlook

Reporting Phishing Emails in Microsoft Outlook

Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...

How Cybercriminals Compromise Your Business Email

How Cybercriminals Compromise Your Business Email

Email compromise is a clever and widespread technique used by cybercriminals to breach the security of both individuals and organizations, in fact, email compromise is the most common & costliest breach to date. Related | Email Compromise: The Most Common &...

How to Report Phishing Attacks the Right Way

How to Report Phishing Attacks the Right Way

The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...