fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Helpful Outlook Tips

Tip of the Week: Helpful Outlook Tips

Many businesses turn to Microsoft Outlook as their email client of choice. Did you know that Outlook comes with certain features that make it an even better business option? To help you get the most use out of Outlook, we’re sharing a few of these features as this week’s tip.

0 Comments
Continue reading

How Cybercriminals Can Add “Be Scammed” to Your Google Calendar

How Cybercriminals Can Add “Be Scammed” to Your Google Calendar

Users seem to have a bit of a blind spot when it comes to solutions put out by Google, particularly the risks associated with Gmail. It’s almost odd to say: a security threat leverages Gmail. Unfortunately, it isn’t unheard of, as a phishing scam has been leveraging Gmail and its cooperation with Google Calendar for some time now.

0 Comments
Continue reading

Business Communication Tools Your Business Could Use

Business Communication Tools Your Business Could Use

All businesses need some type of communication infrastructure, especially considering how connected today’s workplace is. Today we will look at some of the best communications solutions out there for businesses of all sizes and industries, including many that you may (or may not) have already implemented for yourself. You can use this knowledge to fuel improvements to your own communications infrastructure.

0 Comments
Continue reading

Tip of the Week: How to Utilize Your Business’ Email

Tip of the Week: How to Utilize Your Business’ Email

Email seems to be a pretty basic workplace tool, but like any tool, there are many ways to use it. From sending emails to managing tasks and messages from your inbox, let’s discuss a few tips and best practices to help you use your email like a true professional.

0 Comments
Continue reading

Taking an Exploratory Stab at Spear Phishing

Taking an Exploratory Stab at Spear Phishing

Chances are, you’ve heard of “phishing” - a cybercriminal’s scam that steals data, access credentials, and other sensitive information by fooling a user into thinking they are providing this information to someone who is supposed to have access to it. However, there are a few different kinds of phishing, based on how it is carried out. Here, we’ll discuss the realities of spear phishing, and the risks it poses to your business.

0 Comments
Continue reading

Tip of the Week: Enabling Smart Compose on Gmail for Android

Tip of the Week: Enabling Smart Compose on Gmail for Android

As we have opened our lives to technologies like machine learning and artificial intelligence, it would seem that the beneficial predictions made in science fiction are more likely to become fact. Many of these technologies have actually manifested in some of the smallest, but most useful, ways. For this week’s tip, we’ll learn how to leverage Gmail’s predictive Smart Compose feature on Android.

0 Comments
Continue reading

Microsoft Launches Office 365 Advanced Threat Protection

Microsoft Launches Office 365 Advanced Threat Protection

Microsoft has been at the forefront of security through their numerous operating systems for decades. As the security of computing systems and communication gets more important, and with threats to that security growing exponentially, the world’s leading software company has made it a point to introduce a new security platform to help people in many walks of life keep their endeavors secure. Today we’ll look at the new security & compliance services that are bundled with the Microsoft 365 cloud platform.

0 Comments
Continue reading

Tip of the Week: Simplifying Your Email with Consolidation

Tip of the Week: Simplifying Your Email with Consolidation

How many email accounts do you have? Out of those, how many do you check regularly, and how many different platforms are they on? Too many, and you’re apt to miss something important. That’s why we’re going over how to ensure that your emails are well-organized and accessible from a single source.

0 Comments
Continue reading

The Major Points of A Secure Email Solution

The Major Points of A Secure Email Solution

It’s not out of the ordinary for employees to not know the best practices surrounding email management, but it’s something that any self-respecting employer needs to consider. How are your employees using their email, and are they putting your organization at risk? The best way to address these issues is taking a two-pronged approach involving training employees on proper best practices, as well as taking technical measures to keep the risk of a breach to a minimum.

0 Comments
Continue reading

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

0 Comments
Continue reading

Tip of the Week: How to Avoid Spam Emails

Tip of the Week: How to Avoid Spam Emails

Would you just give your bank account information to anyone who called you up and asked for it? Probably not. For the same reason, you wouldn’t just download attachments from your email messages without a second thought. This can be a dangerous practice, as some of the most common threats nowadays spread themselves via unwanted email attachments. It’s important that you can identify when it’s the right time to download an attachment, and when it’s best to just leave it be without exposing your business to unnecessary risk.

0 Comments
Continue reading

Tip of the Week: Sync Your Inboxes with IMAP

Tip of the Week: Sync Your Inboxes with IMAP

How many emails do you send on a daily basis? You use it so frequently that you might not second-guess how it actually works. Depending on the way your business uses email, you might be able to optimize the way that it works for your mobile devices. There are two types of protocol that work to varying degrees for your email solution.

0 Comments
Continue reading

Tip of the Week: How to Write a Better Email

Tip of the Week: How to Write a Better Email

Writing an email is one of the most prevalent methods of communication in the business world, but it’s not as easy as you might think. There are considerable details and intricacies to mastering this art, and we’re here to help. By the end of this blog article, you’ll be armed with five tips to write the most effective email that you can.

0 Comments
Continue reading

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

0 Comments
Continue reading

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

0 Comments
Continue reading

3 Time-Saving Benefits to Outsourced Email Management

3 Time-Saving Benefits to Outsourced Email Management

You don’t have time to worry about managing your email solution, but it’s still a vital aspect of your business’s operations. You never know when someone will fall for a spam message, and you certainly can’t look over the shoulders of each employee to make sure they don’t. What’s the busy business owner to do? How can you get quality email management without it eating up too much time and effort on your part?

0 Comments
Continue reading

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Washington small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Plan Law Enforcement Telephone Systems Human Resources Display Cybercrime Smartphones Gadgets Digital Signage Virtual Assistant Cryptomining Malware Remote Monitoring Education Processor Spam Blocking Internet of Things Mobile Device Miscellaneous Screen Mirroring VoIP Settings Users Smart Office Business Computing Mobile Devices Manufacturing Hardware Internet Facebook Save Money Windows Software as a Service App Samsung Upgrade Spam IT Services Communications Word Technology Telephony Windows 10 Online Shopping Digital Signature Innovation Automation Cloud Computing Saving Money Big Data Microsoft Efficiency Identity Theft Security Safety Social Engineering Data Breach Communication Practices Public Cloud Holiday Microchip Outlook Productivity Augmented Reality Chrome OneNote Health Microsoft Office Encryption Google Docs Data Data Security User Error VPN Audit Unsupported Software Meetings Update Bring Your Own Device Artificial Intelligence Voice over Internet Protocol Software Networking Addiction Data Recovery Mobile Device Management IBM Business Continuity Windows 7 BYOD Compliance Alert Help Desk Managed IT Services Small Business Vulnerability ROI Hackers Windows 10 Cortana IT Support Business Skype Procurement Hosted Solutions History Comparison Disaster Recovery Telephone System Content Management Quick Tips Remote Worker Business Intelligence Training Managing Stress Cryptocurrency Tech Term Computer Servers Privacy Smart Tech Employee 5G Downtime Managed IT Services NIST Virtualization Data Protection Two-factor Authentication Ransomware Outsourced IT Vendor Sports Money Network Security Business Management Browser Data Storage Infrastructure Best Practices IT Management Fraud Electronic Medical Records Apps How To Information Password Remote Workers Tip of the Week Social Media Wi-Fi Google Social Connectivity User Tips Backup Blockchain Bandwidth Office 365 Passwords Router Workplace Tips Smartphone Scam Computers Machine Learning Staff Redundancy eWaste Collaboration Android Managed IT Network Cybersecurity BDR Access Control Phishing Managed Service Google Drive Government WiFi Employer-Employee Relationship CES Botnet Operating System Paperless Office Cloud Email Applications Leadership Avoiding Downtime Keyboard Server Net Neutrality Website Data Backup Private Cloud Workers Patch Management

Newsletter Sign Up