Aldridge Blog

Quick reads to improve your IT strategy

Most Recent Posts

Remote Access Security Risks

If your business uses Office 365, who controls your file permissions? If your business uses a remote desktop solution, how often are users required to change their passwords? How will you know if a network compromise occurs? Every organization is different, and so is...

4 Law Firm Technology Trends to Follow in 2017

Law firms often come to us looking for advice about which technology trends will drive their firm in the coming year. However, compromising security to embrace the latest technology innovation is not an option for a firm whose primary asset is sensitive information....

IT Outsourcing: What It Is and How It Works

IT service providers have transitioned from using a break-fix approach, to proactive strategies and planning, which can help give your company the freedom and time to innovate without worrying about the health of your IT environment…

It Security

Reporting Phishing Emails in Microsoft Outlook

Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...

How Cybercriminals Compromise Your Business Email

Email compromise is a clever and widespread technique used by cybercriminals to breach the security of both individuals and organizations, in fact, email compromise is the most common & costliest breach to date. Related | Email Compromise: The Most Common &...

How to Report Phishing Attacks the Right Way

The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...

Microsoft 365

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

It Consulting

Should an Accounting Firm Outsource their IT? Pros & Cons

As an accounting firm, your primary focus is providing financial services to your clients. However, in today's digital age, technology plays an increasingly important role in the operations of businesses of all types, including accounting firms. This raises the...

Don’t Miss Our Most Popular Articles

Reporting Phishing Emails in Microsoft Outlook

Reporting Phishing Emails in Microsoft Outlook

Phishing attacks are becoming increasingly commonplace; it's no longer a question of 'if', but 'when'. When you receive a phishing email, it's important that you understand how to recognize the attack and take the appropriate action. If you're a Microsoft Outlook...

How Cybercriminals Compromise Your Business Email

How Cybercriminals Compromise Your Business Email

Email compromise is a clever and widespread technique used by cybercriminals to breach the security of both individuals and organizations, in fact, email compromise is the most common & costliest breach to date. Related | Email Compromise: The Most Common &...

How to Report Phishing Attacks the Right Way

How to Report Phishing Attacks the Right Way

The battle against phishing requires not only cautious online behavior but also an understanding of how to report phishing incidents effectively. Take a look at the crucial steps and strategies for reporting phishing the right way and safeguarding both your personal...