Blogwphungerford2024-08-27T15:39:02+00:00 Generic selectors Exact matches only Search in title Search in content Post Type Selectors Show AllCustomer StoriesCybersecurityIT SupportManaged ServicesMicrosoftTech TipsVoIPWebex Dec 18 2024Change Your Microsoft Sign-in Page to Avoid Man-in-the-middle Attacks read more Dec 16 2024Why We Recommend Cable Installation Services read more Dec 11 2024Are You Traveling for Work? Here’s What We Need to Know. read more Dec 9 2024Microsoft Ending Support for Mail and Calendar Apps read more Dec 4 2024The Case Against BYOD for Business Security read more Dec 2 2024Email Examples: What Ends Up in Inbox vs. Junk vs. Quarantine? read more Nov 27 2024What is Cisco Duo MFA? read more Nov 25 2024What Should You Do After Falling for a Text Scam? read more Nov 20 2024What Do I Need to Do with Obsolete Equipment? read more Nov 18 2024Email Archiving and Retention Policies Your Organization Should Implement Now read more Nov 13 20246 Tips for Decluttering Your Outlook Calendar read more Nov 11 2024Using OneDrive Without SharePoint Creates Organizational Challenges read more Nov 6 2024How to Handle Objections with Your Employees When They Defend Keeping Passwords in a File read more Nov 4 2024On-premises Server Makes Sense for Spec Tool read more Oct 30 2024Why Does Social Engineering Happen? read more Oct 29 2024What Happens When You Use the Phish Alert Button? read more Oct 28 2024How Do Passwords Get Hacked? read more Oct 23 2024Why Keeping a File with Passwords on Your Computer is a Terrible Idea read more Oct 22 2024Top 3 Cybersecurity Threats We Uncovered at GrrCon 2024 read more Oct 21 2024Why Does My Organization Need Cybersecurity Insurance and an MSP? read more Oct 16 20247 Reasons Your Organization Needs Cybersecurity Insurance read more Oct 15 2024NIST Releases New Password Rules: What Does It Mean for You? read more Oct 14 2024My Dad Lost Thousands in a Romance Scam: How They Work and How to Protect Yourself read more Oct 9 2024Early Warning Signs Your Employees Need to Look Out for and Report to IT read more Oct 8 2024What is Quishing and How Do You Protect Yourself? read more Oct 7 2024Tips for Running an Effective Cybersecurity Awareness Campaign read more Oct 2 20246 Conditional Access Policies You Should Turn on Now read more Oct 1 2024What is a Pig Butchering Scam and How Do You Protect Yourself? read more Sep 30 2024Take Advantage of Tax Benefits by Upgrading to Windows 11 Now read more Sep 25 2024Why Do We Encourage Our Clients to Use Microsoft Edge Over Google Chrome? read more Sep 23 2024How to Access Clipboard History in Windows read more Sep 18 20245 Differences Between Business-grade Computers and Consumer-grade Computers read more Sep 16 2024Are Extended UPS Warranties Worth It? read more Sep 11 2024What is a UPS and How Often Should I Replace It? read more Sep 9 2024Committed vs. Uncommitted Microsoft 365 Licenses read more Sep 4 2024What to Do if Your Credentials Are Stolen read more Sep 3 2024What Assets Should I Track for IT Budgeting and Planning? read more Aug 28 20244 Reasons Why Your Employees Should Stop Using Apple’s Mail App for Work Email read more Aug 26 2024How to Use Outlook Archive to Keep Your Inbox Storage Smaller read more Aug 21 2024How Do Ticket Surveys Work? read more Aug 19 2024Things to Consider Regarding Hotspots for Your Employees read more Aug 14 2024IaaS vs. SaaS: Your Guide to Moving to a Serverless Environment read more Aug 12 2024How Do We Prioritize Submitted Tickets? read more Aug 8 2024Stories We Help Our Clients Tell: Taking IT More Seriously read more Aug 5 2024What Do We Audit for in Our Advisory Alignment Process? read more Jul 31 2024What is the 3-2-1-1-0 Backup Rule? read more Jul 29 2024Did You Get a Scary Email? Here’s What to Do. read more Jul 24 2024Password vs. Passphrase: Which One is Better? read more Jul 23 20243 Reasons Your Login Attempt Might Be Denied read more Jul 17 2024What is the 3-2-1 Backup Rule? read more Jul 15 2024How an Incident Response Plan Can Save Your Company read more Jul 10 2024Why Do I Need Huntress Protection for My Network and Microsoft 365? read more Jul 9 2024How to Change Your Email Signature on the Outlook Mobile App read more Jul 2 2024How to Use Daily Focus Plan in Microsoft Outlook to Get Work Done read more Jul 1 2024Top 10 Cybersecurity Misconfigurations and Why They Matter read more Jun 26 2024Never Tell Anyone Your Password, Even IT Staff read more Jun 24 2024Why We Utilize Service Express for Server Warranties read more Jun 20 20243 Common Security Practices in Cybersecurity Insurance Applications read more Jun 18 2024What are the Stages of a Cyberattack? read more Jun 13 2024Why We Recommend Valley City Electronic Recycling read more Jun 11 2024What is Microsoft Recall and Why is it Concerning Some Cybersecurity Researchers? read more Jun 5 2024What is Microsoft Secure Score and How Do I Improve It? read more Jun 3 20247 Questions to Ask Before Choosing a PDF Editor read more May 29 2024Why Would You Tag Someone in an Email? read more May 28 2024The Art of @ Mentions in Webex Spaces read more May 23 2024How to Use Focus Sessions in Windows 11 to Get Work Done read more May 20 2024Why Did I Get Locked Out for Using a Personal VPN? read more May 16 2024Why is Vulnerability Management Important? read more May 14 2024Cell Phone Stipends for MFA in the Workplace read more May 10 2024What are MailTips in Microsoft Outlook? read more May 8 2024Event Assists Ensure Smooth Meetings for NAHB read more May 1 2024What are Reporting Requirements After a Data Breach? read more Apr 29 2024Debunking the Myths of Registering Your Phone with Your Organization read more Apr 23 2024Windows 11 In-place Upgrade or Clean Install? read more Apr 18 2024Planning Your Upgrade from Windows 10 to 11 read more Apr 16 2024Microsoft Unbundles Teams and Office: What You Need to Know read more Apr 11 2024Why Does Windows 11 Need TPM 2.0? read more Apr 9 2024Mel Trotter Enjoys Flexibility with Co-managed IT read more Apr 4 2024How Do I Identify My Critical Applications? read more Apr 2 2024Is Your Organization an Ideal Fit for Our IT Services? read more Mar 28 2024Is it More Secure to Use Cellular Data or Public Wi-Fi? read more Mar 26 2024What Determines Whether an Email Goes to Junk Folder or Quarantine? read more Mar 21 20246 Reasons a Business Password Manager is Better Than a Personal One read more Mar 20 2024The 5 Pillars of an Effective Cybersecurity Solution read more Mar 15 2024Why We Recommend Microsoft 365 Business Premium to Our Clients read more Mar 12 2024B&G Sales Switches to Hungerford for Managed Services read more Mar 7 2024How to Modify Outlook Calendar Sharing Permissions read more Mar 5 2024What You Need to Know About the New Microsoft Teams read more Feb 29 2024What is Our Process for Stopping a Phishing Attack? read more Feb 27 2024Migration to Cloud Offers Convenience for Paws With A Cause read more Feb 23 2024How to Use Microsoft Loop to Create To-do Lists read more Feb 21 2024What is the Value of Technology Alignment? read more Feb 16 2024Should I Upgrade, Repair or Replace My Computer? read more Feb 8 2024How to Submit Employee Onboarding Requests Through the HT Support App read more Feb 5 2024Is Your Organization Ready for Windows 11? read more Jan 31 2024VPN vs Cloud Storage: Which is Best? read more Jan 26 2024How to Send an Encrypted Email in Microsoft Outlook read more Jan 23 2024How is an Offboarded Employee’s Email Handled? read more Jan 18 2024How to Enable and Disable Startup Applications read more Jan 16 2024What is Microsoft Loop? read more Jan 11 2024Beware of Emails That Ask for Login Credentials read more Jan 9 2024Who is Not a Good Fit for Our Phone Systems? read more Jan 4 2024Who is a Good Fit for Our Phone Systems? read more Jan 2 2024Employees Using a Personal Computer to Access Work Data is a Bad Idea read more Dec 27 2023What are Phishing Attacks Attempting to Accomplish? read more Dec 21 2023Why is 3 to 5 Years the Recommended Replacement Timeframe for Computers? read more Dec 19 2023Are You on the Naughty List of Bad Password Usage? read more Dec 14 2023How to Send Meeting Availability in Outlook read more Dec 12 2023How to Avoid Shipping and Phishing Scams During the Holidays read more Dec 9 2023Why You Should Upgrade Your Windows Operating System read more Dec 7 2023How to Sync Files with OneDrive read more Dec 5 20235 Signs You Might Need New Computers read more Nov 29 2023How to Master Messaging in the Webex App in 5 Minutes read more Nov 27 2023Get Up and Running With the Webex Calling App in Just 11 Minutes read more Nov 21 2023What is Single Sign-on? read more Nov 16 2023Why Do MSPs Use Ticketing Systems? read more Nov 14 2023What are the Differences Between Windows 10 and Windows 11? read more Nov 7 2023Wright Plastic Products Values ‘Knowledgeable’ HT Staff to Tackle Co-managed IT read more Nov 3 20235 Factors That Determine Cost of a New Phone System read more Nov 2 2023What is a VPN and Why Might You Need One? read more Oct 26 2023How to Stay Secure: A Roundup of 7 Educational Cybersecurity Blog Posts read more Oct 24 2023Multifactor Authentication Prompt Bombing: What Is It and How Do You Protect Yourself? read more Oct 19 2023Avoid These 6 Cybersecurity Myths and Misconceptions read more Oct 17 2023Microsoft Ends Support for Windows Server 2012 and 2012 R2: What Does That Mean for Your Business? read more Oct 12 20233 Cybersecurity Measures SMBs Should Implement Now read more Oct 10 2023Follow These 3 Rules to Avoid Online and Phone Scams read more Oct 5 2023How Does Security and Privacy Work with Microsoft 365 Copilot? read more Oct 2 2023What is the Process for Purchasing a New Phone System? read more Sep 27 2023Is a Managed Service Provider Right for Your Business? read more Sep 21 2023How do Data Breaches Happen? read more Sep 15 2023Why is a Business Password Manager Different from a Personal Password Manager? read more Sep 11 2023What is the Average Lifespan of a Computer? read more Aug 30 2023Why Do IT People Ask Me to Clear My Cache? read more Aug 23 2023Is My Data Safer in the Cloud? read more Aug 18 2023HT Helps The Gabriel Group Employees Improve Organizational Security read more Aug 10 2023How to Review Quarantined Emails in Microsoft Outlook read more Aug 8 2023As Phishing Attacks Surge, It’s Important to Take Phishing Training Seriously read more Aug 2 2023What is a Firewall? read more Jul 24 2023What Are Bing Chat Enterprise, Microsoft 365 Copilot and How Can They Help Your Business? read more Jul 20 2023FTC Safeguards Rule Provisions: We Can Help read more Jul 13 2023What is Two-factor Authentication? read more Jul 6 20233 Times You Should Not Accept Cookies read more Jun 30 2023What Are Cookies and Cache on My Computer? read more Jun 22 2023Why Does Turning Your Computer Off and On Again Work? read more Jun 15 2023How to Use Webex Calling for Chrome read more Jun 8 2023Why You Need to Stop Using the Same Password on Multiple Accounts read more May 30 2023What to Expect When Getting a New Computer read more May 18 2023How Do You Prolong the Lifespan of Your Computer? read more May 12 2023What Is Webex Go? read more May 3 2023What is the My Apps Section in the HT Support App? read more May 3 2023How and When to Start a Chat with a Support Technician read more May 3 2023How and When to Submit a Ticket Using the HT Support App read more Apr 26 20234 Reasons Why You Should Enable BitLocker on Your Organization’s Devices read more Apr 20 2023What is BitLocker? read more Apr 13 2023Why it’s a Bad Idea for Businesses to Allow Local Administrator Access read more Apr 4 20237 Common Questions People Ask Before Purchasing a New Phone System read more Mar 29 2023How To Prepare for Windows Patching read more Mar 29 2023What is Microsoft Windows Patch Management? read more Mar 28 2023Keep Email Organized with Outlook’s Focused Inbox read more Mar 21 2023What is the Dark Web and What is Dark Web Monitoring? read more Mar 16 2023Why You Should Use a Password Manager Instead of Your Web Browser to Save Passwords read more Mar 9 2023How Much Does It Cost to Hire a Managed Service Provider? read more Mar 2 2023Why You Should Hire a Managed Service Provider read more Feb 19 2023How do I Know if My Password is Strong? read more Feb 5 2023What is a Managed Service Provider? read more Jan 28 2023How Can Managed Service Providers Use AI Chatbot Technology? read more Jan 22 2023What is the Difference Between Spam and Phishing? read more Jan 2 2023Things You Should Know About the LastPass Breach read more Dec 23 2022Why It’s OK to Upgrade to Windows 11 Now read more Dec 3 2022Should You Move to a VoIP Phone System? read more Nov 19 2022Can Your Business Support a Remote Workforce? read more Nov 4 2022How VoIP Can Improve Customer Service read more Oct 27 2022Mandatory 10 Digit Dialing for National Suicide Prevention read more Oct 7 2022Tips for a Smooth Virtual Conference Call read more Sep 24 2022Why Can't I Record My Webex Meeting? read more Sep 3 2022Top VoIP Phone System Features read more Aug 20 2022Does a VoIP Phone System Make Sense for Your Business? read more Aug 5 2022Using the Webex Mobile App read more Jul 20 2022How to Screen Share in Webex read more Jul 4 2022How to Optimize Your Internet Connection for Webex Meetings read more Jun 23 2022HT Joins the Technology Council of West Michigan read more Jun 4 2022How to Troubleshoot Bad Video in Webex Meetings read more May 21 2022How to Troubleshoot Bad Audio in Webex Meetings read more May 2 2022How to Troubleshoot Joining Webex Meetings read more Apr 22 2022How to Use Polls in Webex Meetings read more Apr 2 2022The New Webex Meetings Breakout Sessions read more Mar 19 2022The New Webex Assistant for Webex Meetings read more Mar 5 2022How to Test Your Webex Meeting Connection read more Feb 26 2022The New Look and Feel of Webex read more Feb 9 2022How to Optimize Your Meeting Room Technology Using Webex read more Jan 25 2022Choosing the Best Video Conferencing Equipment read more Jan 7 2022Joining a Meeting or Conference Call by Phone read more Dec 22 2021Get the Most out of Webex Teams read more Dec 6 2021What To Do When You Can't Connect To a Webex Meeting read more Nov 24 2021Choosing the Right Webex Plan read more Nov 9 2021How to Choose Remote Meeting Technology read more Oct 23 2021Getting started With Webex Teams read more Oct 7 2021Webex Best Practices When Working Remotely read more Sep 26 2021Considerations for Closing the Office and Working Remotely read more Sep 11 2021Is Your Tech Support Rep Acting as Your IT Security Consultant? read more Aug 24 2021The Difference Between Help Desk & Full-Service IT Support read more Aug 8 20215 Ways to Improve Your Line Charts in Excel 2016 read more Jul 27 2021Why PowerPoint’s Grouping Feature Doesn’t Always Work read more Jul 9 2021Convenient Calling Features That Can Boost Productivity read more Jun 27 2021How to Transform a Table into a Chart in Microsoft Word read more Jun 10 2021Help! I Spilled Coffee on My Keyboard read more May 26 2021How to Extract Text from Images Using OneNote read more May 11 2021Changing the Setting for the Sleep Timer in Windows 8 & Windows 8.1 read more Apr 25 202110 Keyboard Shortcuts to Use When Presenting PowerPoint Slideshows read more Apr 11 2021How to Use iOS 12’s Enhanced ‘Do Not Disturb’ Feature read more Mar 25 2021Business Benefits of Video Conferencing Tools read more Mar 9 2021What’s the Best Way to Engage Your Virtual Team? read more
Nov 6 2024How to Handle Objections with Your Employees When They Defend Keeping Passwords in a File read more
Oct 14 2024My Dad Lost Thousands in a Romance Scam: How They Work and How to Protect Yourself read more
Jun 11 2024What is Microsoft Recall and Why is it Concerning Some Cybersecurity Researchers? read more
Oct 24 2023Multifactor Authentication Prompt Bombing: What Is It and How Do You Protect Yourself? read more
Oct 17 2023Microsoft Ends Support for Windows Server 2012 and 2012 R2: What Does That Mean for Your Business? read more
Jul 24 2023What Are Bing Chat Enterprise, Microsoft 365 Copilot and How Can They Help Your Business? read more
Mar 16 2023Why You Should Use a Password Manager Instead of Your Web Browser to Save Passwords read more