Aldridge Blog
Quick reads to improve your IT strategy
Most Recent Posts
Why You Need SOC and SIEM for a Strong Cyber Defense
As cyberthreats continue to evolve, business leaders are increasingly turning to solutions like Security Operations Centers (SOC) and Security Information and Event Management (SIEM) to stay ahead. You’ve probably heard these terms before, and you might even be...
Microsoft Loop: Unlock Seamless Collaboration
Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...
How to Conduct a HIPAA Security Risk Assessment (SRA) for Healthcare Providers
As healthcare providers, safeguarding patient information is paramount. The Health Insurance Portability and Accountability Act (HIPAA) mandates that organizations conduct regular Security Risk Assessments (SRAs) to identify vulnerabilities and protect sensitive data....
SharePoint in 30 Minutes – Part 7: Using Office Apps
Video Transcription Let's explore what it's like to work with SharePoint but from a local Office app. Instead of using something like Word Online, we're going to actually use Word installed on a PC. In order to make sure that you can access your SharePoint...
SharePoint in 30 Minutes – Part 6: Web and Desktop Apps
Video Transcription Let's talk about all of the apps that are available that work with SharePoint Online. To access the online versions of these applications while you're in SharePoint, you can click the application launcher in the top left of the window. This...
We Are Aldridge: Taylor Blocker
Senior Support Technician Taylor Blocker was once an art conservator. Hear his story and watch him paint a portrait of …
Which Cloud Provider Should I Choose? [Video]
From Microsoft Azure and Amazon Web Services to private cloud environments, companies have plenty of file storage options. But which is best for your business?
SharePoint in 30 Minutes – Part 5: Sharing Basics
Video Transcription You can share documents with others in your organization as well as those outside your organization in a few simple steps. When you share documents from SharePoint, you no longer have to worry about saving and editing multiple copies of the...
SharePoint in 30 Minutes – Part 4: Recover and Restore Documents
Video Transcription If you need to recover a deleted file from anywhere in SharePoint, regardless of who the changes or who deleted the file, you can do this from the recycle bin located in the left navigation menu. Once here, you can see information about a...
SharePoint in 30 Minutes – Part 3: Features and Collaboration
Video Transcription Now that we have our first document created, let me show you some of the actions that you can take on that document. If you'll notice, there's a ribbon up at the top with some quick actions that you can take. We've already used the "new"...
It Security
Reporting Phishing Emails in Microsoft Outlook
Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...
How Cybercriminals Compromise Your Business Email
Email compromise is a clever and widespread technique used by cybercriminals to breach the security of both individuals and organizations, in fact, email compromise is the most common & costliest breach to date. Related | Email Compromise: The Most Common &...
How to Report Phishing Attacks the Right Way
The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...
Microsoft 365
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
It Consulting
[Webinar] Prepare, Respond, & Recover | Take Control of Your Cyber Risk
Our expert panelists from Aldridge, Buchanan, and Higginbotham have worked with 100’s of businesses affected by cybercrime. They want to share what they’ve learned so that you understand today’s threats and how to effectively protect yourself and your business. Get an...
Microsoft Loop: Unlock Seamless Collaboration
Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...
Don’t Miss Our Most Popular Articles
Reporting Phishing Emails in Microsoft Outlook
Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...
How Cybercriminals Compromise Your Business Email
Email compromise is a clever and widespread technique used by cybercriminals to breach the security of both individuals and organizations, in fact, email compromise is the most common & costliest breach to date. Related | Email Compromise: The Most Common &...
How to Report Phishing Attacks the Right Way
The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...