Blog

Automate New Employee On-boarding

Onboarding a new employee can turn into chaos between the number of manual data entries through multiple departments to the cumulative hours to complete the task due to delays in email communications. This process can average out to take 2-3 weeks to complete resulting in the new hire sitting with nothing to do on his first few days.

Security – Stay Alert

designDATA continues to invest in keeping your environments safe. There are options in our security offerings that will protect against pending attacks as named below. In this interesting time, we need to stay aware of pending attacks and respond accordingly and your education has been the best risk mitigation overall.

Productivity with TEAMS Continue to Increase

At the beginning of the pandemic, organizations leaned more on the current technology to collaborate. As shelter-in-place orders grew state to state the use Microsoft technology grew as well.  With the isolation of remote work growing the need for human connection became crucial to business development and the use of video conferencing for meetings increased substantially on Teams.

Router Considerations While Working from Home

While working from home, you may have noticed some things about your internet connectivity. It may even bother you so much that you’ve become curious to how you can improve it.  Here are some things to consider:

Security – password
The Upload and Download Speed
Signal Strength

Before we begin any improvement discussion, it may seem odd to begin with security.

How to Implement Better Cyber Hygiene Practices as Employees Work Remotely

Erik Haas, director of sales and marketing was interviewed for ASAE and offered some basic measures that organizations should take to improve their cybersecurity posture.  designDATA, AHT Insurance, and Hartman Executive Advisors share their perspectives with ASAE on how to mitigate cybersecurity risk in a remote work environment:

https://www.

Increase Productivity With macOS

Series Three 

Continuity Camera for Pictures and Scanning 

Take a photo 

Open a supported application on your Mac. Control-click or right-click in the document or window where you want the photo to appear. Then select Import or insert from iPhone or iPad.

Phishing Scams Aim to Exploit Coronavirus Fears

Cyber criminals are taking advantage of fears over coronavirus by conducting phishing attacks and spreading malware and trickbots , which could lead to ransomware by sealing credentials and personal information.  These thieves exploit concerns about the COVID-19 outbreak for their own criminal means.

How To Keep Uninvited Guests Out of Your Zoom Event

Zoom is a videotelephony and online chat services through a cloud-based peer-to-peer software platform and is used for teleconferencing, telecommuting, distance education, and social relations.  With most of the country working from home and using Zoom as well as other cloud-based communications there has been an uptick in hacking stories.