Aldridge Blog
Quick reads to improve your IT strategy
Most Recent Posts
Why You Should be Using ‘Named Ranges’ in Excel
One of the most powerful yet often underutilized features in Excel is Named Ranges. Named Ranges offer significant benefits, especially when dealing with complex datasets and formulas. What Are Named Ranges? Named Ranges in Excel allow you to assign a name to a...
Microsoft Loop: Unlock Seamless Collaboration
Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...
How to Conduct a HIPAA Security Risk Assessment (SRA) for Healthcare Providers
As healthcare providers, safeguarding patient information is paramount. The Health Insurance Portability and Accountability Act (HIPAA) mandates that organizations conduct regular Security Risk Assessments (SRAs) to identify vulnerabilities and protect sensitive data....
We Are Aldridge: Ileana Jacquez
Senior Administrative Assistant Ileana Jacquez moonlights as a pastry chef. Hear her story and watch her make some mouth-watering desserts…
SharePoint in 30 Minutes: Overview
Video Transcription SharePoint is a part of the Office 365 suite from Microsoft that acts as a cloud-based hub for all of your company's content such as documents, spreadsheets, presentations, images and more. With SharePoint you can create, store and share...
We Are Aldridge: Josh and Rychi Cloud
Our people are the backbone of our company and its culture. Couple Josh and Rychi Cloud bring a dose of Disney magic to the office…
Client Spotlight: Communities Foundation of Texas
Aldridge has the privilege of working with companies that strive to make an impact in their respective industries. We recently spent time talking to Dave Scullin, President and CEO of Communities Foundation of Texas…
We Are Aldridge: Matt Parker
Our people are the backbone of our company and its culture. The men and women who work at Aldridge are just as diverse as their interests. Hear the story of Service Desk Lead Matt Parker, a member of Bikers Against Child Abuse…
Client Spotlight: North Texas Giving Day
North Texas Giving Day was founded in 2009 to build awareness and support for north Texas nonprofits. Now in it’s tenth year, the organization has…
Client Spotlight: Antares Homes
At Aldridge, we have the privilege of working with hundreds of companies that strive to make an impact in their respective industries. We recently spent time talking to several employees at Antares Homes, a home builder in the Dallas-Fort Worth area....
It Security
How to Report Phishing Attacks the Right Way
The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...
Protect Yourself from Phishing (5 Red Flags to Watch for)
Cybercriminals have perfected the art of deception, creating sophisticated traps that can trap even the most cautious of users. As we navigate the internet, it's crucial to arm ourselves with the knowledge and awareness necessary to recognize phishing attempts and...
Cybersecurity Hygiene: 6 Best Practices to Work Responsibly
Just as we prioritize personal hygiene to stay healthy, adopting a proactive approach to safeguarding our digital lives is equally important. The concept of “Cybersecurity Hygiene” takes practice and knowledge to fully master, but understanding these basic...
Microsoft 365
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
It Consulting
[Webinar] Prepare, Respond, & Recover | Take Control of Your Cyber Risk
Our expert panelists from Aldridge, Buchanan, and Higginbotham have worked with 100’s of businesses affected by cybercrime. They want to share what they’ve learned so that you understand today’s threats and how to effectively protect yourself and your business. Get an...
Microsoft Loop: Unlock Seamless Collaboration
Effective collaboration is the cornerstone of success for businesses worldwide. With the increase of remote work, the need for collaboration tools has never been more pressing. Microsoft Loop, a groundbreaking platform designed to streamline collaboration, enhance...
Don’t Miss Our Most Popular Articles
How to Report Phishing Attacks the Right Way
The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...
Protect Yourself from Phishing (5 Red Flags to Watch for)
Cybercriminals have perfected the art of deception, creating sophisticated traps that can trap even the most cautious of users. As we navigate the internet, it's crucial to arm ourselves with the knowledge and awareness necessary to recognize phishing attempts and...
Cybersecurity Hygiene: 6 Best Practices to Work Responsibly
Just as we prioritize personal hygiene to stay healthy, adopting a proactive approach to safeguarding our digital lives is equally important. The concept of “Cybersecurity Hygiene” takes practice and knowledge to fully master, but understanding these basic...