Blog
What Is Cyber Liability Insurance and Why Is It Important for Small Business?
Nobody likes paying for insurance, but one of the hard facts of owning a business is that there is an array of insurance that must be maintained (and provided, but that’s a different topic). One that is often overlooked by small business—but can actually be more...
Which Facebook business page template you should use and why
If you haven’t created a business page for your company on Facebook, do it now. Open a new tab in your browser and go to https://www.facebook.com, then use the set up wizard to complete all the necessary steps (you always edit anything later). Seriously. It’s far more...
Biggest Benefits of VoIP for Small Business
Most services associated with operating expenses are going virtual these days. Which is good news for businesses who are considering Voice over Internet Protocol (VoIP). Even though this technology has been around since 1995, advancements in service and functionality...
Top Tech Trends for Small Business in 2021
It’s safe to say that 2020 was one of the unruliest years in recent memory. The pandemic decimated entire industries, forced many businesses around the world to close their doors, and reminded everyone that survival depends on the ability to adapt and innovate. Even...
How Multitasking is Hurting Your Job Performance (and health)
Since more and more people work remotely, psychological studies are emerging that dig into the real implications of bad work habits. And since lion’s share of schools and companies don’t teach us how to be an effective worker (only how to work), we are left to our own...
Holiday Tech Reminders for Working from Home (BONUS: gift ideas!)
Even those of us who work from the office are probably finding more reasons than just the pandemic to work from home this month. The weather is turning colder, and the coming holidays are bringing their own considerations. So, since everyone is getting cozier and...
Excel Tips for Beginners and Casual Users (with screenshots)
Excel is a vast universe of tools that are all designed to store, organize, and (most importantly) manipulate data. For anyone who’s used the program, it’s pretty apparent from the start that even a user working in it for a few years probably only scratches the...
Multi-factor Authentication: Why it’s here, what it is, and why you need it
Why do I keep hearing about multi-factor authentication? Have you noticed that the minimum requirements for a new password are getting more and more complex these days? Even on simple websites like your local florist or your online neighborhood watch group, security...
How a Computer Network Actually Works
If you’re reading this article, it means that your device is connected to a computer network. Networks like the one you’re connected to right now have transformed the way we communicate, access information, and work. But just like most everything in the world of...
How to Use Google Alerts to Grow Your Business (and how to set them up)
Google Alerts are great for small businesses who don’t have much (if any) of a marketing workforce. Oddly though, they’re rarely leveraged until a savvy marketing shows up and turns them on. Small business owners and salespeople typically aren’t educated about how...
Why Everyone (yes, everyone) Needs Antivirus Software
If you lived in a bad area, would you leave the front door to your house unlocked? Of course not! When it comes to the “house” that your data is stored in (i.e. your computer), you can think of the internet as one huge bad neighborhood, and no computer that’s...
Advanced and easy tips for Word that will make you a document master
Word is a program that most data workers can't live without. It's easy to use interface and intuitive layout makes it faster to learn than other word processing software out there. Plus, since it's a part of the Microsoft Office 365 suite, it's already integrated into...
Do You Know the True Cost of Data Loss?
Here’s a not-so-fun-fact for you: there’s approximately a 60 percent chance that your organization will suffer a data breach in the span of three years unless you implement the necessary cybersecurity measures to prevent it. If you fail to protect your organization...
Winning the Battle Against Disorganization with OneNote Keyboard Shortcuts
Microsoft OneNote is a commonly used weapon in the Microsoft 365 arsenal that combats disorganization. And for good reason. Microsoft has been perfecting it since 2003, and it is now a universe of information gathering, organization, and integration tools that can...
Help Desk Cavalry and Cavu Networks Join Forces
Help Desk Cavalry’s acquisition of Cavu Networks fortifies their position as Kitsap County’s leading business technology provider. (Bremerton, WA – Oct 6, 2020) Kitsap County’s most trusted business technology providers announced that they are joining forces with the...
In Layman’s Terms: What It Means to be In the Cloud
We’ve all heard the term “cloud computing,” often mentioned in the same sentence as words like “affordable,” “scalable,” or “secure.” But even though the cloud has been making the headlines in the world of technology and business alike since it was introduced by...
Microsoft Forms: Professional surveys, quizzes, and polls in minutes
Microsoft Forms is a little known, but super helpful tool in the Microsoft productivity suite. It’s simple and intuitive to use (yes, we mean it!). Even the most basic user can quickly create forms, surveys, quizzes, polls, and a lot more. Creating branded template,...
How to Detect a Phishing Email
In our last blog, we showcased the most commonly used types of phishing scams like waterholing, whaling, and smishing. Now we want to help you spot them. Most of these scams have tell-tale signs which means that you can proactively train your employees and educate...
10 Major Types of Phishing Scams
Nearly 1 out of every 3 data breaches involved small businesses. That’s according to Verizon’s 2020 Data Breach Investigations Report (DBIR) calculations. And many of these data breaches involved phishing scams of one sort or another. What exactly is phishing and how...
Highest Priority Reasons Why You Need Data Backup
Stay safe and stay open. A FEMA study showed that 40% of businesses that suffer major data loss never reopen. And for those that make it past the first year, the odds actually increase into the second. It can be as bad as having a fire in your store. These statistics...
Windows Keyboard Shortcut Timesavers
It's always helpful to take a fresh look at keyboard shortcuts. After all, we change how we work all the time, like a new mouse or monitor that shifts how we approach our keyboards. Or new programs and cause us to perform new repetitive tasks. These are some of the...
Help Desk Cavalry Debuts on Inc 5000 List
Inc Magazine Ranks Help Desk Cavalry on the Inc 5000 2020 Fastest Growing Private Companies in America List This recognition puts Help Desk Cavalry among only 23 other Washington State Information and Communications Technology (ICT) companies Help Desk Cavalry...
Security mistakes you should never be caught doing
Mistakes happen, that's a fact of life. But some mistakes have higher consequences than others, especially when they impact the security of your data and/or dollars. Make sure that you stay alert when going about your day since these little missteps can make a huge...
The Difference Between VPN and Remote Desktop Access
We often find that people conflate VPNs and remote desktop access. While it's true that they both allow a computer user to access a different machine through that computer, they have fundamentally different purposes and advantages. What is a VPN? VPN (Virtual Private...