Blog

When Employees Leave Do You Take Away Their (Technology) Keys?

  Earlier today, I’d just sat down to lunch and a client texts me that 3 of their employees just walked out. Within 5 minutes of that text - - All the now-former employees' entry fobs had been disabled - ...

Zoom's "A server with the specified hostname could not be found" problem

If you launch Zoom and see a window like this and can't log in, click "Back" (shown below) and that will get you back to where you can fill in your email/password.  

SMALL BUSINESSES - YOU CAN'T DO YOUR OWN IT ANYMORE

    Yeah. . .I said it. I’m sure it sounds pretty arrogant, coming from a provider of IT services. But as ...

Cisco Meraki Go GR10 Wireless Access Point Review

    We've been a Meraki partner since before Cisco acquired them. We've always loved the product. Its power, flexibiltiy of ...

HANDLING A COMPUTER'S END OF LIFE

Once a computer has outlived its useful life and has no value either as a spare machine or as a donation, it’s time to discard it. All computers end up here eventually. So what happens when it’s time to throw ...

How To: Share Your Calendar In Outlook For Mac

A few days ago I wrote about how to add a shared mailbox that has been shared with you. This time I’m going to cover how to share your calendar with a colleague - and how to accept a calendar ...

MY "FOCUS HACK"

  As a general rule, whenever someone talks about a "life hack" or a "productivity hack" I'm extremely skeptical. But I stumbled upon a product I feel compelled to pass on. ...

How To: Subscribe To Shared Mailbox In Outlook For Mac

  We work a lot with Microsoft 365 and when a person leaves a company, we convert their mailbox to a shared mailbox. That way we can be sure the departed employee loses access to their mail while the company ...

Microsoft Releases Multiple New Features For Teams

Teams was "just another Microsoft application" before the pandemic.  Thanks to Covid-19 though, demand for video conferencing solutions shot through the roof, and suddenly Teams found its groove. Microsoft had been gamely ...

Enemybot Malware May Go Beyond DDOS Attacks

Unless you're an IT Security Professional, you may never have heard of EnemyBot.  It is a bit like the Frankenstein of malware threats, a botnet that has borrowed code from multiple different ...

Contact

Wild Frog ConsultingWild Frog Consulting Logo $$$

Social Media