Digital transformation initiatives are piling more users and data onto today’s networks.
As a result, the Internet is fraught with bad actors pouring resources into new ways to access sensitive data and
infect systems in ways that could bring an orga…
Sample file: 3 ways to quickly deal with blank cells in an Excel sheet
This is the demonstration file to accompany the article, 3 ways to quickly deal with blank cells in an Excel sheet, by Susan Harkins.
Try this simple hack to gain unlimited gmail addresses (free PDF)
Gmail includes a fantastic feature that many don’t know about, which makes it possible for you to expand the number of actual Gmail addresses you can use. Just imagine having separate email addresses for just newsletters, work communications and more? …
Home video setup: What you need to look and sound professional
While you upgrade your office to work remotely, don’t forget about improving it to get better results for video.
You may say to yourself, “But I don’t film anything at home?” Eu contraire, mon ami, more than likely you film yourself every day. All of t…
iCloud vs. OneDrive: Which is best for Mac, iPad and iPhone users? (free PDF)
Smart professionals know—maybe many learned the hard way—never to keep data in a single location. Although the temptation exists—insidiously alluring with its seduction of ease—to simply store files, especially work in progress, on a Mac desktop or in …
Bring your own device (BYOD) policy
The Bring Your Own Device (BYOD) movement has helped business save money on technological spending by allowing employees to use their own mobile devices, tablets or other electronics to conduct company operations.
The convenience of letting users rely …
Checklist: Onboarding and offboarding IT staff
Employees, contractors and even interns come and go. IT departments, of course, are tasked with ensuring the proper accounts, applications, services and permissions are assigned to each user. The process quickly becomes complex, considering the variety…
Artificial intelligence ethics policy
The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence.
This policy can be customized as needed to fit the needs of your organization.
From the policy:
SUMMARY
The use of artificial intel…
Mobile device security policy
More and more users are conducting business on mobile devices. This can be due to increases in remote workers, travel, global workforces, or just being on-the-go. This policy provides guidelines for mobile device security needs in order to protect busi…
Sample file: How to use XLOOKUP() to find commission benchmarks in Excel
This is the demonstration file to accompany the article, How to use XLOOKUP() to find commission benchmarks in Excel, by Susan Harkins.