Aldridge Blog
Quick reads to improve your IT strategy
Most Recent Posts
Why You Should be Using ‘Named Ranges’ in Excel
One of the most powerful yet often underutilized features in Excel is Named Ranges. Named Ranges offer significant benefits, especially when dealing with complex datasets and formulas. What Are Named Ranges? Named Ranges in Excel allow you to assign a name to a...
Defending Against Volt Typhoon: China’s State-Sponsored Cyberattack Group
Threat actors are employing increasingly sophisticated tactics to damage and disrupt US businesses and critical infrastructure. One of these major threat groups is the Chinese state-sponsored cyberattack team "Volt Typhoon" (source). First identified in 2023, Volt...
[Webinar] Prepare, Respond, & Recover | Take Control of Your Cyber Risk
Our expert panelists from Aldridge, Buchanan, and Higginbotham have worked with 100’s of businesses affected by cybercrime. They want to share what they’ve learned so that you understand today’s threats and how to effectively protect yourself and your business. Get an...
What is Email Encryption?
Email is the No. 1 business communication tool. However, it’s one of the internet’s least secure tools. So, what can you do to mitigate this risk? The answer is simple: encrypt your emails.
SharePoint in 30 Minutes – Part 8: Sync Files for Offline Use
Video Transcription Another great feature of SharePoint is the ability to synchronize a library to your computer. You can sync all of the files and folders from your favorite SharePoint location to your desktop using OneDrive, which is Microsoft's cloud storage...
SharePoint in 30 Minutes – Part 7: Using Office Apps
Video Transcription Let's explore what it's like to work with SharePoint but from a local Office app. Instead of using something like Word Online, we're going to actually use Word installed on a PC. In order to make sure that you can access your SharePoint...
SharePoint in 30 Minutes – Part 6: Web and Desktop Apps
Video Transcription Let's talk about all of the apps that are available that work with SharePoint Online. To access the online versions of these applications while you're in SharePoint, you can click the application launcher in the top left of the window. This...
We Are Aldridge: Taylor Blocker
Senior Support Technician Taylor Blocker was once an art conservator. Hear his story and watch him paint a portrait of …
Which Cloud Provider Should I Choose? [Video]
From Microsoft Azure and Amazon Web Services to private cloud environments, companies have plenty of file storage options. But which is best for your business?
SharePoint in 30 Minutes – Part 5: Sharing Basics
Video Transcription You can share documents with others in your organization as well as those outside your organization in a few simple steps. When you share documents from SharePoint, you no longer have to worry about saving and editing multiple copies of the...
It Security
The Pros & Cons of Microsoft Copilot
We’re constantly searching for ways to work smarter. Microsoft Copilot has appeared as a powerful solution, promising to be your trusted companion in the world of productivity. Take a look at the pros and cons of Microsoft Copilot to see if it would be a good fit for...
Copilot, Microsoft’s New AI Assistant
Microsoft 365 Copilot is an intelligent, AI-driven digital assistant designed to streamline your workday. In the ever-changing world of coding, developers are constantly seeking ways to work smarter and make coding easier. Microsoft Copilot, an innovative code...
Reporting Phishing Emails in Microsoft Outlook
Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...
Microsoft 365
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
It Consulting
DIY vs. Managed Security: Choosing the Right Option for Your SMB
In today's digital landscape, safeguarding your business from cyber threats is paramount, especially for small and medium-sized businesses (SMBs). With the rise in cyber attacks targeting organizations of all sizes, finding the right security solution is critical for...
Defending Against Volt Typhoon: China’s State-Sponsored Cyberattack Group
Threat actors are employing increasingly sophisticated tactics to damage and disrupt US businesses and critical infrastructure. One of these major threat groups is the Chinese state-sponsored cyberattack team "Volt Typhoon" (source). First identified in 2023, Volt...
Don’t Miss Our Most Popular Articles
The Pros & Cons of Microsoft Copilot
We’re constantly searching for ways to work smarter. Microsoft Copilot has appeared as a powerful solution, promising to be your trusted companion in the world of productivity. Take a look at the pros and cons of Microsoft Copilot to see if it would be a good fit for...
Copilot, Microsoft’s New AI Assistant
Microsoft 365 Copilot is an intelligent, AI-driven digital assistant designed to streamline your workday. In the ever-changing world of coding, developers are constantly seeking ways to work smarter and make coding easier. Microsoft Copilot, an innovative code...
Reporting Phishing Emails in Microsoft Outlook
Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...