Archive by Author

Phishing Attack

3 Tips to Arm Yourself From Phishing Scams

This post is part 1 of 1 in the series Cyber Security Basics

Phishing is one of the most dangerous and compromising scams on the Internet. “Phishing” refers to an attempt to acquire sensitive information such as your login credentials or passwords by pretending to be a trustworthy source such as your bank or email provider. The anatomy of a phishing email is simple: a service you may […]

Working Remote Checklist

Working Remotely: Your Documentation and Testing Checklist

This post is part 5 of 5 in the series Working Remotely

Editor’s Note: Check out our five-part Working Remotely series to obtain tips and learn best practices to help you make sure your business operates at peak performance, whether employees are in the office or not. You can review the previously posted articles including employee laptops, moving your company to the Cloud, setting up a VPN […]

What is PBX

Working Remotely: What is a PBX and Why Do I Need One?

This post is part 4 of 5 in the series Working Remotely

Editor’s Note: Our Working Remotely blog series shares tips and best practices to help you make sure your business operates at peak performance, whether employees are in the office or not. This post explains how to ensure that phone calls and faxes get through to remote employees.  Thus far in this series, we’ve discussed how […]

Configure VPN

Working Remotely: How to Configure a VPN

This post is part 3 of 5 in the series Working Remotely

Working offsite on a regular basis? Have an employee who is hoping to take advantage of your company’s work-life balance benefits? Perhaps your organizational structure requires members of your team to be on-the-road? Internet Creations’ Working Remotely series is for you! Get up-to-date with industry best practices and obtain tips and advice that will keep […]