banner-section
CALL US 402.398.9580

August Quick Tip

Brooke Nielsen
Organize your notes with OneNote 2016!

OneNote is a digital note taking application that allows users to take notes in a free form or more organized manner, depending on their style. Notes taken here can easily be located, reorganized, printed, and shared between users. Using OneNote, users are also able to simply add drawings, screen clippings, audio clips, and even handwritten notes using a stylist. Notes saved in OneNote can then be found on any device, making them more accessible and portable.
 
Today, we are going to discuss just a few basic tasks that can be accomplished using OneNote 2016.
 
Read More
Topics: Staff Training

Are you using your email's deleted folder to file?

Wynn Obermeyer
A ridiculous, illogical, absurd story...
 
I would like to tell you the story about an organizer, her name was Olivia. Olivia hated the fact that all of her important papers: birth certificates, her children’s immunization records, passports, and automobile titles were not stored in one place. Olivia then gathered all of these important documents together and placed them all in a red file folder labeled “Important Documents.”  Now, Olivia needed to determine the best place to store the red file folder. “Ah ha!” she thought. “I will store the folder in the one place I see every day, the kitchen trash can.” A week later, Olivia needed the red file folder labeled “Important Documents” to obtain what she needed to enroll her children in school. Imagine Olivia’s shock and panic when she saw that the kitchen trash can was EMPTY.  “Where did the red folder go?” Olivia’s husband had put the trash out for trash pickup the previous day. Olivia was furious with her husband, “Didn’t you see I had labeled the red file folder in the trash can ‘Important Documents’ how could you throw that away?”
Read More
Topics: Staff Training

July Quick Tip

Brooke Nielsen
Save time searching for e-mails by creating custom search folders that include your specified criteria!
 
Isolating messages with key phrases or peoples’ names can save the time and hassle of searching. Search folders continually gather messages using your specified criteria, and now you can view all of these messages in one place, even if they are filed in various folders.
 
For example, if your folder seeks messages regarding a person, topic or specific email (whether they are from that person or the e-mail just mentions their name), the email will begin to populate within that folder.
 
You can also use this tool to organize your e-mails regarding a company project. By naming the project in the search criteria, you can easily keep track of all related e-mails, without having to manually search for and place them into a specified folder.
 
By organizing your e-mails this way, you can decide what comes directly into your inbox and what goes to specified folders. This saves time in locating an e-mail, as well as helps you decide what to view now in your inbox versus what can wait for later.
 
Another example using this approach: you can decide to send all newsletters you receive from vendors or other companies to a specific folder, thus cleaning up your inbox and saving this reading for another day or time when you are able to keep up on your news.
Read More
Topics: Staff Training

BEC fraud: The threat you can't afford to ignore

Brooke Nielsen
Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today.

What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to fraudulently authorize the transfer of company funds. Payments are then wire transferred from their victims to foreign banks where they are quickly dispersed to the scamming party.

With so many businesses being affected, including The Scoular Co., one of Omaha’s largest companies, it is important to educate yourself and your employees about BEC.
Read More
Topics: Staff Training, Security Threats, Data Breach

Arm your employees with these 5 key security basics

Vee Figueroa
There are numerous ways owners and managers protect their company from security threats. Hopefully you recognize some of these security solutions which include: use of a commercial grade firewall, endpoint protection software, proper patching, updating software programs, and—last but not least—strong data backup.
 
All these security solutions are key to securing your network and data, however one task often ignored is employee education!  As an employer you will want to be certain your employees understand how important securing data and your network is to company productivity. Once you have stablished the importance of security, then train employees on the basics.
 
Here are the “5 key security basics” to train and implement with your staff. All of these will aid in protecting your network and business data.
Read More
Topics: Staff Training, Security Threats

How to avoid mobile security risks in 2016

Megan Thiemann

Keeping private information safe has always been a priority, however more than ever, smartphone threat protection is of the utmost importance. According to Pew Research Center, 68 percent of American adults own a smartphone. This number only continues to grow as more businesses adopt the idea of BYOD. The more that employees and contractors use mobile devices to access organizational systems, application and data, the more important it is to protect such access. Here are CoreTech’s tips on how to avoid mobile security risks.

Read More
Topics: Staff Training, Security Threats

Do you need a vacation after your vacation?

Vee Figueroa

Getting help with your email hangover.

So you have just gotten home from a very relaxing, much needed vacation.  You feel great! The work tension in your body is gone. On Monday you walk into your office still thinking of the beautiful scenery you’ve just encountered. You turn on your PC, open Outlook and…POW. Relaxation is gone!!

What seems like a thousand emails start piling up. Some of them are junk, some very important, and some are needed information to use later. You dread the thought of sorting through each email to decide what actions must be taken.

We’ve all been there.

Read More
Topics: Staff Training

Working from home is easy (and productive)

Vee Figueroa

So here we are on the verge of spring (thank goodness), and I do have to say this winter gave us some perilous drives to work. In fact, one so icy that my boss declared it a “work at home” day. I was relieved as I live on a hill that is not forgiving and there were no snow plows in sight!

In years past, working from home would have not have been as productive as I had files and software that I need available to get my work done. Now, there are so many different avenues to tap to be productive away from the office that working from home was not an issue!

Read More
Topics: Staff Training, Owners & Managers

Passwords are like underwear

Joel Havenridge

Almost anything you do online these days requires a password, from logging into your Facebook account to conducting online banking to managing personal and business credit card statements. Passwords are a necessity to keep your online information safe and sound. How should you protect your passwords?

  1. You shouldn’t leave them out where people can see them.
  2. You should change them regularly
  3. Don’t share them with friends.
  4. You shouldn’t loan them out!
Read More
Topics: Staff Training

Windows 7 tips, tweaks, & secrets

Matt Allen

I came across a great educational resource for Windows 7. Although written when Microsoft just launched 7 and people were transitioning from Vista (or XP as the case may be), these tips are still applicable to Windows 7 today.

Now, don’t be overwhelmed by the number of tips – yes, there are 50! We’ve called out a few for you below to check out. Plus, the website is a resource you may refer back to once a week or so in order to put some time-saving features to use. Before you know it you will have implemented a lot of useful features you had never considered in the past.

Read More
Topics: Staff Training