[ IT Security Training ] Training Videos News Articles Newsletter
We keep tabs on the latest insights and security threats in IT. Here are some guides to help protect you and your organization from cyber attacks.
What are the fundamentals of IT security? Here is an executive overview.
Learn More...Here is a short overview of 31 steps you can take to help protect your business assets.
Download PDF...Protect your organization, and your reputation, from cyber criminals by starting from the inside-out.
Learn More...These simple pointers allow you to confirm the validity of a questionable email.
Learn More...Has an acquaintance informed you that they received a bogus email from you?
Learn More...Security awareness training can help to keep all staff aware of phishing attempts.
Learn More...Don't be blindsided by your employee's dark web data. It's likely that information about you, your employees, or business is being sold on the dark web.
Learn More...Do you know what a data breach could cost you? How can cyber insurance help?
PCI/PII Calculator...Discover the hidden dangers of working from home. Remote workers threaten 1 in 3 businesses.
Watch Video...Start on the path to greater cybersecurity awareness. We provide training for you and your staff at no additional cost.
➥ Nextworks Cybersecurity Portal Login
➥ Portal Manager Training Video
➥ Learn More about Cybersecurity
IT Security Training [ Training Videos ] News Articles Newsletter
We've put together a handful of training videos addressing common help desk topics.
Reacquaint yourself with the fundamentals and even pick up some new skills.
Learn More...Microsoft 365 uses multifactor authentication. Here is how to get set up.
Watch Video...Protect your organization from advanced email threats with Nextworks Email Security.
Watch Video...IT Security Training Training Videos [ News Articles ] Newsletter
Here we have an archive of Nextworks news articles shared on LinkedIn and Blogger discussing various IT and VoIP technologies.
✎ | Ten Ways to Get Internet at Home | What are my options for home Internet? | October 2024 |
---|---|---|---|
✎ | Moving Your 365 from GoDaddy to Microsoft | Why should I move? What to consider. How to move. | October 2024 |
✎ | Windows 10 Approaching End of Life | How does this affect me, and should I care? | October 2024 |
✎ | What is Pig Butchering? | Don't be a pig! Learn how this scam works. | September 2024 |
✎ | Sending Private Information via Email | How does it work and what options do I have? | August 2024 |
✎ | Helpful AI Tips | Get started using AI right now. | August 2024 |
✎ | What Happened with CrowdStrike? | Possibly The Largest It Outage In History | July 2024 |
✎ | Why Get Cybersecurity Insurance | An Increasingly Essential Policy | June 2024 |
✎ | IT and Employee Onboarding & Offboarding | There's more to it than you might think. | June 2024 |
✎ | Under the Hoodie | Exposing Internet Scammers | April 2024 |
✎ | Can I use a Mac in the workplace? | Exploring the Feasibility of Macs in the Workplace | April 2024 |
✎ | How is Windows 11 Different than Windows 10? | We answer the most common questions posed to us about windows 11. | March 2024 |
✎ | Why You Should Be Thinking About Microsoft Copilot | Everything You Need to Know About Copilot and How it Can Help Your Business | February 2024 |
✎ | Are Your Backups Safe? | How Even Your Backups Might Be Vulnerable in a Cyberattack | January 2024 |
✎ | Why it’s Easier Than You May Think to Switch to a Better IT Partner | Transitioning from bad IT to excellent IT can be seamless. | December 2023 |
✎ | Take Your Email Security to the Next Level | Protect your organization from advanced email threats by adding Nextworks Email Protection. | September 2023 |
✎ | Cybercriminals are Defeating MFA/2FA to Access Your Online Accounts | How the Adversary-in-The-Middle (AiTM) Phishing Scam Works | August 2023 |
✎ | Password Managers for Business and Individuals | Keep your business passwords safe and consolidated. | July 2023 |
✎ | Navigating Budget Constraints and High Inflation | Why IT Teams are Teaming Up with IT Service Providers | June 2023 |
✎ | Working Smarter in the Field Using VoIP | Service Professionals Replacing Cellular Calls with Softphone Calls | April 2023 |
✎ | Increase Your Security with Geo-Blocking | Blocking Access by Location | March 2023 |
✎ | Reigning in the Use of Personal Cell Phones for Company Business | Protecting Your Greatest Asset – Your Customers | February 2023 |
✎ | A.I. Impact on the Future of Spam, Phishing, and Cybercrime | Will artificial intelligence be a tipping point into cybersecurity chaos? | January 2023 |
✎ | Don’t Fall for a Big Business Phone System | How Local Service Delivers Superior Results | October 2022 |
✎ | IT Expense Considerations in a Bear Market | Decreasing your IT TCO doesn’t need to reduce your organization’s technology capabilities. | August 2022 |
✎ | The Real Value of MSP | Why Hourly IT is No Longer Effective | May 2022 |
✎ | The Ubiquitous Heist | How the #1 Email Scam Works | April 2022 |
✎ | Comcast SecurityEdge | An MSP's Perspective | February 2022 |
✎ | Living with Spam | Filters to the Rescue, Mostly | March 2020 |