FUNCSHUN Cybersecurity

How To Make Awesome Slides In Microsoft PowerPoint

Microsoft PowerPoint is the industry leader in presentation software, a venerable application that’s over 30 years old. Awesome PowerPoint slides can greatly enhance the visual impact of a meeting presentation. The inverse is also true: terribly designed PowerPoint slides can create serious distraction and disinterest. Many a speaker has been undermined by his or her […]

Honoring Those Who Gave Their Lives

On Memorial Day we remember the veterans who made the ultimate sacrifice for our country. These brave men and women have dedicated their lives to honor the living and make our lives better.   [youtube https://www.youtube.com/watch?v=K9ubI1KPIRI]  Can’t see the video above?  Click Here. The History Of Memorial Day Memorial day is the most solemn American holiday. […]

5 Ways Managed IT Services Is the Right Choice for Your Business

Choosing a managed IT services firm to handle your business’s IT is the right choice for many businesses. Here are our top 5 reasons why. 1. Focus on Your Business’s Core Competencies Here’s the bottom line: unless you are a managed IT services firm, your core competency isn’t IT services. It’s something else. Every resource you devote […]

What Are the Benefits of SD-WAN for Today’s Businesses?

Ensuring that you have a high-speed, highly reliable digital connection to the world is crucial for today’s technology leaders. Business professionals are now accustomed to near-instant access to the information and platforms that they need and are increasingly unwilling to accept less than perfection when it comes to infrastructure. Unfortunately, infrastructure can be extremely expensive […]

How to Share Screens with Microsoft Teams

[youtube https://www.youtube.com/watch?v=ISSDppQnyiE]  Microsoft Teams is an amazingly powerful collaboration tool that’s available as a part of the Microsoft Office suite. At its core, it’s kind of like Slack on steroids, but that core functionality is just the tip of the iceberg. Because it’s integrated with the rest of Microsoft Office, it has so many powerful […]

5 Crucial Elements to Training Your Employees in Optimal Cyber Security

Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold your data for ransom, practice espionage, or simply disrupt your business, most hackers cannot access your network without an “in.” In other words, they require a login, personal access codes, or network […]

Here’s What You Need to Know About SD-WAN Technology

Moving from hardware solutions to software solutions isn’t a new concept for technology professionals, but network infrastructure has traditionally been a hardware-focused world even as applications move to the cloud. With the introduction of SD-WAN, or Software-Defined Wide Area Networks, IT professionals find themselves needing to retool their understanding of flexible networks and security. The […]

Managed IT Improves Processes, Adds Value

If you’re running a small to medium business (SMB), you’ve probably come across the term “managed IT” or “managed IT service.” What is managed IT, and what can it do for your small to medium business? Today we’ll answer these questions and more. Read on to learn about managed IT and how it helps your […]

Critical Update From Microsoft: Remote Desktop Services

Impacted Systems: Windows Server 2003 Windows XP Windows7 Windows Server 2008 Nonimpacted Systems: Windows 10 Windows Server 2016 Windows Server 2019 If you are still using Windows Server 2003 or XP, Windows 7, Windows 2008 R2, or Windows 2008 you could be in trouble. A wormable virus may be coming your way. The virus is […]

Church Hit with Business Email Compromise

There was big business security news out of Brunswick, Ohio (a part of the Cleveland metro area) last month, this time involving a church. According to local reporting, the St. Ambrose Catholic Parish recently announced to parishioners that they had been swindled out of a whopping $1.75 million. The attackers’ methods have real implications for churches […]