HowTo/App Review
Back
Quick Fix for Printer Issues
Posted By: Tanner Clark

WHO IS RUNBIZ?
Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.
To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.
To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.
How to Add an Email Signature in Outlook
Posted By: Tanner Clark
How to add an email signature in Outlook
Office 365, Outlook 2016, Outlook 2013, Outlook 2010, Outlook 2007
Instructions:
- In Outlook, select New Email
- Under Message menu, select Signature, then Signatures
- In the Signature and Stationery box, select New
- Type your name, then click Ok
- Under Edit Signature, Type your name, title and contact info as you would like it to appear
- Use buttons to the right of “Business Card” to add an image or company logo
- Select your name in the drop down menu beside “New messages:”
- (optional) To prevent clutter in email threads, select (none) in drop down menu beside “Relies/forwards:”
Click Ok to save changes.
WHO IS RUNBIZ?
Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.
To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.
To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.
How To Find Your Computer Name
Posted By: Tanner Clark
How to Find Your Computer Name
(Windows 10, Windows 7, macOS)
Windows 10
- Right Click – Start Menu
- Left Click – “System”
Windows 7
- Left Click – Start Menu
- Right Click – “Computer”
- Left Click – “Properties”
macOS
- Left Click – Apple (top right corner)
- Left Click – “System Preferences”
- Left Click – “Sharing”
WHO IS RUNBIZ?
Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.
To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.
To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.
How to Fix Multiple Monitor Orientation
Posted By: Tanner Clark
How to Fix Multiple Monitor Orientation
- Right click on your desktop
- Select “Display Settings”
- Click and drag your monitors into the correct order.
- Select “Apply”
WHO IS RUNBIZ?
Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.
To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.
To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.
Why is Outlook "working offline"?
Posted By: Tanner Clark
Why is Outlook working offline?
By Ryan Richardson
One of the issues our clients frequently call about, is Microsoft Outlook showing to be offline. This is shown by and indicator at the bottom of Outlook. The reasons this can happen vary, but the solution is simple.
At the top of your window, choose the Send / Receive tab, then click the “Work Offline” button. Then you will see it reconnect back into the exchange. Most of the time, this will do the trick.
If it’s still failing to connect, it is possible that your .ost file is corrupt, or that you’re not online or connected to your network. At this point, call us and we’ll get you squared away.
You also may be wondering, why does a work offline mode even exist?
This comes in handy a road trips or plane rides. Anywhere you don’t have connectivity. You can work offline and Outlook will store your data in an offline file location. Now when you reconnect to the network, Outlook will go back online and send and receive all your mail. Occasionally “work offline” gets stuck and that’s a common reason we have to come back and re-connect manually.
Mimecast - Making Email Safer For Business
Posted By: Tanner Clark
by Ryan Richardson
Email is the number one business application that organizations rely on for communicating and sharing files, also making it the number one way for criminals to attack.. We’ve seen rapid growth in cyber attacks and that’s why we believe it’s so important to have the right tools in place.
Mimecast is a great tool we use for our clients to protect, manage and archive email. There are several key features that make up Mimecast.
The first being their spam filter. Mimecast’s spam filter SLA stops 99% of spam from landing in your inbox. It does a great job of protecting you from malware and viruses, while also increasing your productivity.
Secondly, Mimecast offers Targeted Threat Protection against Phishing, Spear Phishing, and what’s known as CEO Fraud using features such as:
Impersonation Protect,
Attachment Protect,
URL Protect,
And Internal Email Protect.
Third, Mimecast has added the ability to Archive email, which secures, preserves and streamlines access to email and other important data.
Overall, Mimecast is a very comprehensive and customizable tool, keeping your company’s email secure and functioning as it should.
Importance of Impersonation Protect in Mimecast
Posted By: Tanner Clark
Importance of Impersonation Protect in Mimecast
by Rick Pabst – Senior Support Engineer
Email, and the internet in general, were developed by a group of very smart, competent people. They assumed that everyone using these technologies would be doing so in good faith, as most people do. There is, however, a growingly large percentage of bad actors pretending to be someone they’re not when sending email. This is often in attempt to get you to do something you don’t want to do.
That’s where tools like Impersonation Protect in Mimecast come in to play. This is their effort in stopping the pretenders, letting only the legitimate senders through.
If Impersonation Protect is triggered, Mimecast will send you a message letting you know this has happened, along with sender and recipient information. In most cases it will be obvious that the email is a not from who it says it’s from. In those cases, you can just ignore the email and go on about your day. But... It’s important to note that the system is not flawless. There will be times when Impersonation Protect will hold a legitimate email that you’re expecting. If the email does look safe, or like one that you are expecting, please reach out to us! We will gladly verify that the email is safe and release it to your inbox.
How To: Secure Your Home WiFi Network
Posted By: Tanner Clark
When managing your own wireless connections at home, remember that the qualities that make the internet accessible to you also make it accessible to everyone else. Be smart and secure your network so that only those you allow can access it.
There are two basic steps to securing your home network: (1) keep your devices up to date and (2) secure your wireless router.For specific instructions, see the documentation from your internet service provider or the manufacturer of your device.
- Update all your Internet-enabled devices with the latest operating systems, web browsers, and security software. This includes any mobile devices that access your wireless network, such as Internet of Things (IoT) devices like an Internet-enabled thermostat, lights, refrigerator, and so on. Security software includes anti-virus or anti-malware software. Check your devices for updates regularly and keep them up-to-date.
- Secure your wireless router. Your WiFi network is created by connecting an internet access point – such as a cable or DSL modem – to a wireless router. The default settings on your wireless router, such as a generic password, can be compromised. Here are the ways to secure a wireless router (if necessary, refer to the detailed instructions that accompany your router):
- Change the name of your wireless network. The default name or ID broadcast by your router is assigned by the manufacturer. Change it to a name that is unique to you and does not reveal information about the model or manufacturer.
- Change the preset password for your router. Leaving a default password unchanged makes it much easier for unauthorized people to access your network. Choose a strong password and store it in a safe location. You probably won’t need to use this password unless you are fixing a problem with your network or changing router settings.
- Encrypt WiFi traffic. When choosing your router’s level of security, opt for Wi-Fi Protected Access II (WPA2) if available, or Wi-Fi Protected Access (WPA). These levels are more secure than the Wireless Equivalent Privacy (WEP) option.
- Disable remote administration. It is unlikely you will need to access your router settings from a remote location or network.
- Position the router securely and limit the range of access. Do not place your router in a location where anyone can plug in a network cable to gain access. Try to position it where the wireless signal only reaches the locations where you want access.
- Use a firewall. A firewall is a network security system that monitors and controls incoming and outgoing traffic based on predetermined security rules. It establishes a barrier between your internal network and the outside Internet. Your operating system and/or security software likely comes with a pre-installed firewall. Make sure it is turned on.
How To: Create A Great Password
Posted By: Tanner Clark
How to Create a Great Password
Written By Rick Pabst
Runbiz Support Engineer
We’ve all been trained to use passwords that are hard to remember and subsequently, hard to type. Because of this, we make them as short as possible. But here’s the kicker... Length is your best friend when it comes to passwords.
Here’s a new way to think about passwords.
Use words, phrases, or short sentences for your passwords. e.g. Lyrics to your favorite song, a saying you enjoy.
Here are a few examples of great passwords:
- I like Fridays! (15 characters)
- Pie > Cake. (11 characters)
- Is this the real life? (22 characters)
- Fireandraindance1 (17 Characters)
- Sunshineonmyshoulders5 (22 characters)
- Sunshine on my shoulders. (25 characters)
Easy to remember. Easy to type. Nice and long, which makes them strong.
Some systems won’t let you use spaces, and some systems will limit how long your password can be. Can you imagine having that as a problem? Your password is too long!
Just avoid using personal information! Steer clear of birthdays, phone numbers, names, etc.
Apply these tips, and you’ll be the envy of the security minded everywhere when you quickly and easily type your impenetrably long password.
Run Business Solutions is an IT Managed Services and Website Services provider based in Amarillo, TX. Since 2007, we’ve supported small to mid-sized businesses both regionally and throughout the country. We pride ourselves in helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower people to do what they do well.
To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.
CULTURE AND CORE
Teamwork is the bedrock of the runbiz™ culture. We believe that every team player is what makes Runbiz successful. Our culture and core values are what set us apart. We must be a group of exceptional team players if we are to be an exceptional company. We believe in empowering our team, not only with the tools necessary to get the job done, but also with the confidence and freedom to do the right thing for our customers and teammates. We each understand the essence of our roles, we are motivated by empowering people to do what they do well and have clarity on how to play a part in the vision. We strive to live out the following core values daily:
Kindness – We are caring, respectful, and patient.
Integrity – We are honest, dependable and we do the right thing.
Excellence – We are learning, improving, and exceeding expectations.
Servant Heart – We are humble, helpful, and positive.
Teamwork – We are team players and playing to win.
You website can be a powerful tool for your business. However, if your potential customers cannot find it or cannot find the information they are looking for on it, they will likely return to Google and find another site that provides what they are looking for.
We offer you the tools to take control of your website's content. Ensure your placement in Google's ranking and increase your leads and conversions by keeping your content up to date and relevant with runCMS.
runCMS does not rely on third party plugins that are prone to breakage. Instead, it is actively developed, hosted, and supported by the friendly and experienced staff at Run Business Solutions. That means that you don't need to worry about dealing with hard-to-reach, unreliable web hosting companies.
runCMS is powerful and easy to use. We would love to show you how it works.
Powerful Tools
RunIT CMS gives users powerful and easy to use tools to make managing website content easy. These tools are managed independently and the pages update automatically. This reduces (if not eliminates) the need to use third-party tools to accomplish goals. However, RunIT CMS allows for complete integration with custom CSS and JavaScript.
Galleries
A Gallery is a collection of images. RunIT CMS gives users the ability to create multiple Galleries. Users can upload and re-size image and add them to a Gallery. Images can be re-ordered, deactivated and given a hyperlink. ALT tags are fully accessible.
Galleries can be added to pages as thumbnails, slideshows, or thumbnail slideshows. The slideshow is powered by the Nivo Slider by Dev7studios.
Libraries
A Library is a collection of Resources. A Resource is a file with a Title and Description. A Library could be seen as a collection of files made available on a website with a title and description. Library Resources can have an expiration date added which will cause them to no longer appear on the website when the expiration date passes.
Libraries can be added to pages as simple lists of Titles that are download links or as tables with the Title, Description, File Name, and a Download button. Library downloads are tracked and are reported in the Analytics Dashboard.
Blogs
Blogs are a great way for users to publish fresh content to the world. RunIT CMS includes a Blog tool with Categories. Blog Posts can have a cover photo, can be deactivated, and are edited with the Custom Content Editor. Blog Posts have an optional expiration date.
All non-expired, active Blog Posts are added to the site's automatically generated sitemap.xml file and the site's RSS feed. Blog Posts can integrate with Calendar events, allowing users to create a blog post and a Calendar Event at the same time.
Calendars
No full-featured CMS is complete without a calendar. The RunIT CMS Calendar tool allows users to create multiple calendars, each having a name and a custom color.
Events can easily be added to a Calendar. Events have a Title, Description, Start Date/Time, End Date/Time, option for All Day Event, Reminder Date/Time, and RSVP Required. The Calendar displays on the page as either a calendar or a list of events, each being hyperlinks that open details about the event. If RSVP Required is selected, the event details will allow users to RSVP.
RunIT CMS Custom Content Editors are present throughout the system. They are WYSIWYG (What You See Is What You Get) editors that allow for content to be added and formatted in a Microsoft Word like manner. Our editor is one of the best on the market.
RunIT CMS Custom Content Editor Toolbox
The Custom Content Editors include a wide array of features for formatting text, pasting from Word, and pasting as HTML. Users can apply a CSS class from the site.css file to images and text. There is a full multi-level undo/redo mechanism with action trails like Microsoft Word. The editor includes a spell checker, find and replace tool, and a table builder. The editor also includes a powerful hyperlink manager, image manager, and document manager. The image manager allows users to edit images.
The RunIT CMS Custom Content Editor produces clean, semantic HTML markup that users can view or edit with the click of a button. This allows for advanced users to embed videos, add custom scripts or styles, and generally take total control of how the HTML is going to look.
Content Blocks
There is no reason to repeat the same action (such as copying and pasting) to update multiple pages. No one enjoys manually updating each page of a website in order to update a hyperlink or an image.
It is our goal to eliminate duplicate work when it comes to editing web content. That's what Content Blocks are all about. A content block is a piece of formatted content that can be added to pages and updated in one place. Content Blocks are edited with the Custom Content Editors, giving users complete control over the formatting (and advanced users control over the actual HTML). An example of a use case for a Content Block is a navigation sub-menu that exists in a subset of pages. Another example is a YouTube video that needs to be displayed on many pages and is subject to change.
Site Layout
Users have complete control over the way their websites look. Everything contained in the tag is editable using a Custom Content Editor. The system includes several macros for the purpose of adding the site navigation and page content in any place desired. There are also macros to get the site root, the current date/time, and to add CMS tools to the layout.know your purpose.
We take the time to understand who you are as an organization to determine how we can best serve you. Our goal is that the products and services we offer, allow you to thrive in that purpose.
empower your people.
In order for your organization to reach it’s maximum operational potential, you need the right tools. Technology is always changing, and we stay ahead of the curve to empower your people with best products and support to reach your objectives safely and efficiently.
run your business
By implementing best practices and our extensive specialized knowledge, we free you up to focus on what you do best. We eliminate costly, unnecessary distractions and downtime, giving you the predictability and confidence you need to run your business.