Email Management Strategy – Design!

 

 

 

This month’s email management strategy is:  Design!

 

Use a filing system that reflects all the facets of your daily activities and interactions (i.e., how you really work).  A straight alphabetical list isn’t as helpful as you may think.

Red Alert: How to check for potential email scams

One of our clients received the email shown.  It was extremely convincing. In this case, the sender correctly listed last three digits of one of his accounts.  Fortunately, he was on alert and disregarded the phone number in the email.  He looked up the bank's number online and called them directly.

Religious order relies on more than Faith and Hope when it comes to IT Support

IT Radix is very pleased to welcome the New Jersey Order of the Sisters of Charity of St. Elizabeth to its growing roster of clients.    This large community of nearly 75 Nuns is an assemblage of incredible women who have committed their entire lives to education, health care and pastoral/social services by serving individuals throughout northern New Jersey.

Presenting: Tech Tips for the Business Owner

Thanks NJAWBO Metro East for letting me speak on "Tech Tips for the Business Owner" on Tuesday, March 3 at Toast in Montclair.

According to technology columnist, David Pogue, "today we are expected to learn to use technology via osmosis".

How's that working for you?  I had the pleasure of demonstrating some tips and tricks that will make navigating your devices faster, easier and safer.

What can the Russian Army’s ease of moving into Crimea tell us about protecting your computer network?

Who knows how this international incident will play out, but we do know now that it can provide us some lessons that we can apply to protecting our business and network.

Have a strong firewall to protect your network from the outside world.

Had Crimea had a stronger border, like a firewall, outsiders would not have access to their territory.