Home
Solutions
Login
BizCare Portal - Serving Bay Area Industrial Filtration
+1 (888) 862-4922
Home
Home
Solutions
Sign in
Sign up
Search
Solutions
Explore How-To's and learn best practices from our knowledge base.
Cybersecurity Awareness - Training, Phishing, Ransomware and other Internet Scams
Cybersecurity Awareness - Ransomware, Malware, Phishing and other threats
16
How to Evolve Your Cybersecurity Capability, Maturity and Resilience
Components of our Cybersecurity Framework
Managing Insider Risk through Training & Culture
Cybersecurity Awareness - Be aware of these Common Phishing Subject-Lines
Cybersecurity Awareness - What are the Social Engineering Red Flags?
See all 16 articles
How to Recognize Tech Support Scams
1
How to Recognize A Fake Tech Support Scam
How much Cybersecurity do we need?
21
How the ThreatConnect Research Team Used the Platform to Investigate FANCY BEAR
How to Prioritize and Protect Against Relevant Threats: Context is Key
Cyber Threat Intelligence - How To Do It Wrong
2016 KMPG White Paper - Cyber-Security: It's not just about technology
2016 KPMG White Paper - Cyber security: managing the insider risk
See all 21 articles
Cybersecurity Awareness Tips
18
Ransomware: The Reality - It's here, it's sophisticated - and it's shifty!
STOP. THINK. CONNECT - National Cyber Security Alliance resources
STOP | THINK | CONNECT: Basic Tips & Advice
The Ultimate Checklist To Preventing And Fighting Ransomware Attacks
Your Greatest Cybersecurity Threat: Failing to Plan
See all 18 articles
FIVE-TO-THRIVE
IT'S YOUR DIGITAL OFFICE
18
ACCELERATE YOUR BUSINESS
FIVE-TO-THRIVE FOUNDATION
CO-MANAGED SERVICE DESK
TECHNOLOGY AND SECURITY THAT SERVES YOU (not the other way around)
MONITOR | MAINTAIN | MANAGE - What do they mean?
See all 18 articles
STEP 1: TRANSFORM YOUR NETWORKS
8
WITH CONNECTED COMMUNITIES
Handout: Simplify your IT with Cisco
Handout: Are your Apps and Services aligned with your Networks?
Handout: Reduce Complexity. Increase Insight
Handout: Device as a Service is better than leasing/buying
See all 8 articles
STEP 2: ELEVATE YOUR COMMUNICATIONS
30
ELEVATE YOUR DESKTOP, PHONES, TABLETS AND COMPUTERS
ELEVATE: Calculate Your Savings Here
ELEVATE Online Meetings | Phone | Chat | Contact Center | File Sharing
ELEVATE The Business Owner’s Cloud Phone FAQ
ELEVATE The Business Owner’s Phone System Features Cheat Sheet
See all 30 articles
STEP 3: PRACTICE GOOD CYBER HYGIENE
14
BY CONTINUOUSLY PERFORMING GOOD CYBER-HYGIENE
BY MANAGING YOUR BYODs
BY BLOCKING INFECTIONS BEFORE THEY START
BY PROTECTING YOUR ENDPOINTS (Demo)
BY PROTECTING YOUR ENDPOINTS: Comparing Security Solutions
See all 14 articles
STEP 4: MOVE TO THE CLOUD
18
Digital Office (Video)
PrivateCloud: Features and Benefits
Private Cloud: Drive (How it Works)
Private Cloud For DUMMIES eBook
PrivateCloud: Collaboration and Co-authoring
See all 18 articles
STEP 5: DIY: DEFEND YOUR COMMUNITY
11
DIY: PROTECT YOUR BUSINESS FROM CYBER ATTACKS
DIY: APPLY THE CIS SECURITY CONTROLS IN 3 PHASES
DIY: WHAT IS SOCIAL ENGINEERING?
DIY: HOW TO SPOT PHISHING SCAMS
DIY: AVOID PAYPAL PHYSHING ATTACKS
See all 11 articles
STEP 5: DFY: DEFEND YOUR COMMUNITY
24
KNOW SECURE - KNOW YOUR CYBERSECURITY RISK
GET SECURE: CONTROLS FOR CYBER-LIABILITY INSURANCE
THRIVE SECURE: RADICALLY SIMPLIFIED SECURITY
GET SECURE: TRUSTED IDENTITIES DEVICES AND APPLICATIONS
GET SECURE: MOVE TO PASSWORDLESS AUTHENTICATION
See all 24 articles
General
FAQ
9
About Us
Is This You?
What are Managed Technology Services
Managed IT Services Benefits
Managed IT Services Overview
See all 9 articles
Privacy and Surveillance
6
2016 PEW Research White Paper - Americans' Attitudes About Privacy, Security and Surveillance
2016 PEW Research White Paper - Privacy and Info Sharing
2016 KMPG White Paper - Crossing the Line: Staying on the right side of consumer privacy
2016 PEW Research White Paper - How Americans balance privacy concerns with sharing personal information: 5 key findings
DNS Best Practices, Network Protections, and Attack Identification
See all 6 articles
Printing (Mac)
4
How to save your print settings to use later
Advanced print settings
How to Print Documents from MacOS
How to Force Chrome to Use the Standard MacOS Print Window
MacOS
16
How to update your PrivateCloud Drive connector on MacOS
7 Startup Options Every MacOS User Should Know
How to fix a Mac that won't start up: 10 steps to take when your Mac refuses to start or won't even turn on | My Mac won't switch on!
How to fix a frozen Mac | Mac is stuck and isn't working: 5 steps (and 9 checks) to unfreeze macOS or Mac OS X and get your Mac running again
How to force quit on Mac: How to control-alt-delete on a frozen Mac by using Force Quit to shut down macOS/Mac OS X apps
See all 16 articles
Reports
7
How to read my Executive Summary Report
How to read my Executive Summary Report: Health Score
How to read my Executive Summary Report: Managed Devices
How to read my Executive Summary Report: Protection Effectiveness
How to read my Executive Summary Report: Coverage
See all 7 articles
Windows 10
3
Windows 10 Automatic Repair Couldn’t Repair Your PC
Windows 10 May 2019 Update: The new features that matter most
How to Encrypt a USB Flash Drive or SD Card with Windows 10
Wi-Fi Troubleshooting
2
Wi-Fi connection troubles with your Android?
Wi-Fi connection troubles with your iPhone, iPad, Mac or Apple TV?
Official Holidays & Support Schedule
3
2018 Official Holidays & Support Schedule
2019 Official Holidays & Support Schedule
2020 Official Holidays & Support Schedule
Cisco
1
How to Restart a Cisco SPA
Resolutions
1
CSAT Survey
GETTING STARTED
On Boarding
13
HOW TO ENROLL / SIGN IN TO YOUR SERVICE DESK PORTAL
GET STARTED HERE
ONBOARDING / OFFBOARDING CHECKLIST
ROADMAP TO GET SECURE
ROADMAP TO THRIVE SECURE
See all 13 articles
Networks and Wi-Fi
2
How To Login with Two-Step Verification (Guide)
How To Login with Two-Step Verification (Screenshots)
Elevate
12
ELEVATE VOIP Hardware (Videos)
ELEVATE: How-to (Videos)
ELEVATE - Online Meetings (Videos)
ELEVATE Online Webinars (Videos)
ELEVATE: Managing Auto Attendents
See all 12 articles
Good-Cyberhygiene
10
SecureMail: How Do I Configure Outlook 2016/2019 To Connect To Exchange Mailbox
SecureMail: How Do I Configure Outlook 2016/2019 For Mac To Connect To Exchange Mailbox
How to provision Securemail on Your Iphone
SecureMail: How-To and User Guides
DUO: Get Started here!
See all 10 articles
Clouds
10
PrivateCloud: How to remotely access your Private Cloud
PrivateCloud.Drive: How to persistently sync your Private Cloud with your Windows PC, Laptop, iMac, or MacBook
PrivateCloud.Drive: How to persistently sync your Private Cloud with your iPhone or iPad
Private Cloud Drive: What is On-demand Sync?
PrivateCloud.Drive: File and Folder Management, Sharing and Searching
See all 10 articles
Defend Communities
12
Secure.IT.Duo Getting Started with Duo Security
Secure.IT.Umbrella for iOS - How to uninstall
SECURE.IT: Umbrella: Understanding Content Categories
SECURE.IT: Umbrella: Understanding Security Categories
SECURE.IT: Umbrella: Getting Started: Reporting Basics
See all 12 articles
Humor
Technology laughs
17
Watch: What's your password?
Watch: Net Neutrality Explained with Burgers
The Expert (How square engineers to fit into a round corporate world)
Disaster Recovery Plan
Business Continuity Planning
See all 17 articles
Microsoft Office
Microsoft Outlook 2016
6
Outlook 2016 Quick Reference
How to setup Outlook's out-of-office reply with Manage Rules & Alerts
How to setup Outlook's out-of-office reply with Exchange's Out of Office Assistant
Microsoft Outlook 2016 Tips and Tricks
Microsoft Outlook 2016 Quick Start Guide
See all 6 articles
Microsoft Office 2013 / 2016 / 365 Extras
10
How to Search for Special Characters in Word 2016
Turn One Data Column into Two in Excel 2016
Word 2016 Quick Reference
Project 2013 Quick Reference
Sharepoint 2013 Quick Reference
See all 10 articles
Office 365
4
Microsoft© Office 365 Connect and Collaborate Virtually Anywhere, Anytime
How to Share your Microsoft 365 calendar with people inside or outside your organization
What is Office 365?
Microsoft 365 Training