Blog Category

HowTo/App Review
Back
How to Create a Folder in Outlook
Posted By: Ryan Richardson

Utilizing folders in Outlook can be a great way to stay organized with your emails, calendars, tasks, and contacts.

For runbiz™ customers specifically, creating a folder designated for support requests is a great way to keep track of your ticket correspondence.

To add a folder, do the following:

  1. In the left pane of Mail, Contacts, Tasks, or Calendar, right-click the location where you would like to add your folder, then click “New Folder”.

  2. Enter a name for your new folder, then press Enter.

Quick Fix for Printer Issues
Posted By: Tanner Clark

 

 

WHO IS RUNBIZ?

Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.

To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.

To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.


How to Add an Email Signature in Outlook
Posted By: Tanner Clark



How to add an email signature in Outlook

 Office 365, Outlook 2016, Outlook 2013, Outlook 2010, Outlook 2007

Instructions:

  1. In Outlook, select New Email
  2. Under Message menu, select Signature, then Signatures
  3. In the Signature and Stationery box, select New
  4. Type your name, then click Ok
  5. Under Edit Signature, Type your name, title and contact info as you would like it to appear
  6. Use buttons to the right of “Business Card” to add an image or company logo
  7. Select your name in the drop down menu beside “New messages:”
  8. (optional) To prevent clutter in email threads, select (none) in drop down menu beside “Relies/forwards:”

Click Ok to save changes.

 

WHO IS RUNBIZ?

Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.

To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.

To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.


How To Find Your Computer Name
Posted By: Tanner Clark

How to Find Your Computer Name

(Windows 10, Windows 7, macOS)

Windows 10

  1. Right Click – Start Menu
  2. Left Click – “System”

Windows 7

  1. Left Click – Start Menu
  2. Right Click – “Computer”
  3. Left Click – “Properties”

macOS

  1. Left Click – Apple (top right corner)
  2. Left Click – “System Preferences”
  3. Left Click – “Sharing”

 

WHO IS RUNBIZ?

Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.

To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.

To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.


How to Fix Multiple Monitor Orientation
Posted By: Tanner Clark

How to Fix Multiple Monitor Orientation

 

  1. Right click on your desktop
  2. Select “Display Settings”
  3. Click and drag your monitors into the correct order.
  4. Select “Apply”

 

WHO IS RUNBIZ?

Run Business Solutions is an IT managed services and website services provider based in Amarillo, TX. We support small to mid-sized businesses both regionally and throughout the country. We pride ourselves on helping businesses leverage technology, not just tolerate it. Runbiz is focused on enthusiastically providing excellent technical strategy, services, and solutions that drive our customers' businesses forward. We are passionate about our mission to empower you to do what you do best.

To learn more about our approach to IT, visit our Managed IT or Co-Managed IT pages. If you are looking to revamp your website to look and perform better, visit our Website Services page for more information.

To speak directly to a member of our team, fill out the consultation form! We would love to learn more about your company, your technology needs, and how we can address the unique challenges you face.


Why is Outlook "working offline"?
Posted By: Tanner Clark

Why is Outlook working offline?

By Ryan Richardson

One of the issues our clients frequently call about, is Microsoft Outlook showing to be offline. This is shown by and indicator at the bottom of Outlook. The reasons this can happen vary, but the solution is simple.

At the top of your window, choose the Send / Receive tab, then click the “Work Offline” button. Then you will see it reconnect back into the exchange. Most of the time, this will do the trick.

If it’s still failing to connect, it is possible that your .ost file is corrupt, or that you’re not online or connected to your network. At this point, call us and we’ll get you squared away.

 You also may be wondering, why does a work offline mode even exist?

This comes in handy a road trips or plane rides. Anywhere you don’t have connectivity. You can work offline and Outlook will store your data in an offline file location. Now when you reconnect to the network, Outlook will go back online and send and receive all your mail. Occasionally “work offline” gets stuck and that’s a common reason we have to come back and re-connect manually.


An Overview of Autotask Workplace
Posted By: Tanner Clark

by Ryan Richardson

AWP is an enterprise grade File Sync & Share (FSS) solution, purpose built for business.

Workplace offers a comprehensive solution for secure file sharing among employees and customers, that allows colleagues to collaborate and access documents remotely.

Collaborating internally and externally is made easy with protected access and version control. Files are located in one central place in a controlled environment.

In the past, things like contract negotiations required sending files back and forth with multiple versions of the same document. This quickly gets confusing and cumbersome. With version control, Autotask maintains the latest version of the document, as well as many previous versions for 6 months.

When you do use email to share documents, with an Outlook plug-in, Autotask can be configured to reroute every file attachment to a secure share.

Also, features like Data Sync allow you mobility without compromising file security or requiring manually moving files.

The ultimate goal of Autotask is to eliminate unsecure data transfer and data sprawl that is caused by the old way of doing things.

AWP provides total control from any device, for any collaborator.


Mimecast - Making Email Safer For Business
Posted By: Tanner Clark

by Ryan Richardson

 

Email is the number one business application that organizations rely on for communicating and sharing files, also making it the number one way for criminals to attack.. We’ve seen rapid growth in cyber attacks and that’s why we believe it’s so important to have the right tools in place.

Mimecast is a great tool we use for our clients to protect, manage and archive email. There are several key features that make up Mimecast.

The first being their spam filter. Mimecast’s spam filter SLA stops 99% of spam from landing in your inbox. It does a great job of protecting you from malware and viruses, while also increasing your productivity.

 Secondly, Mimecast offers Targeted Threat Protection against Phishing, Spear Phishing, and what’s known as CEO Fraud using features such as:

Impersonation Protect,

Attachment Protect,

URL Protect,

And Internal Email Protect.

 

Third, Mimecast has added the ability to Archive email, which secures, preserves and streamlines access to email and other important data.

Overall, Mimecast is a very comprehensive and customizable tool, keeping your company’s email secure and functioning as it should.


Importance of Impersonation Protect in Mimecast
Posted By: Tanner Clark

Importance of Impersonation Protect in Mimecast

 

by Rick Pabst – Senior Support Engineer

Email, and the internet in general, were developed by a group of very smart, competent people. They assumed that everyone using these technologies would be doing so in good faith, as most people do. There is, however, a growingly large percentage of bad actors pretending to be someone they’re not when sending email. This is often in attempt to get you to do something you don’t want to do.

That’s where tools like Impersonation Protect in Mimecast come in to play. This is their effort in stopping the pretenders, letting only the legitimate senders through.

If Impersonation Protect is triggered, Mimecast will send you a message letting you know this has happened, along with sender and recipient information. In most cases it will be obvious that the email is a not from who it says it’s from. In those cases, you can just ignore the email and go on about your day. But... It’s important to note that the system is not flawless. There will be times when Impersonation Protect will hold a legitimate email that you’re expecting. If the email does look safe, or like one that you are expecting, please reach out to us! We will gladly verify that the email is safe and release it to your inbox.


How To: Secure Your Home WiFi Network
Posted By: Tanner Clark

When managing your own wireless connections at home, remember that the qualities that make the internet accessible to you also make it accessible to everyone else. Be smart and secure your network so that only those you allow can access it.

There are two basic steps to securing your home network: (1) keep your devices up to date and (2) secure your wireless router.For specific instructions, see the documentation from your internet service provider or the manufacturer of your device.

  1. Update all your Internet-enabled devices with the latest operating systems, web browsers, and security software. This includes any mobile devices that access your wireless network, such as Internet of Things (IoT) devices like an Internet-enabled thermostat, lights, refrigerator, and so on. Security software includes anti-virus or anti-malware software. Check your devices for updates regularly and keep them up-to-date.

  2. Secure your wireless router. Your WiFi network is created by connecting an internet access point – such as a cable or DSL modem – to a wireless router. The default settings on your wireless router, such as a generic password, can be compromised. Here are the ways to secure a wireless router (if necessary, refer to the detailed instructions that accompany your router):
  • Change the name of your wireless network. The default name or ID broadcast by your router is assigned by the manufacturer. Change it to a name that is unique to you and does not reveal information about the model or manufacturer.
  • Change the preset password for your router. Leaving a default password unchanged makes it much easier for unauthorized people to access your network. Choose a strong password and store it in a safe location. You probably won’t need to use this password unless you are fixing a problem with your network or changing router settings.
  • Encrypt WiFi traffic. When choosing your router’s level of security, opt for Wi-Fi Protected Access II (WPA2) if available, or Wi-Fi Protected Access (WPA). These levels are more secure than the Wireless Equivalent Privacy (WEP) option.
  • Disable remote administration. It is unlikely you will need to access your router settings from a remote location or network.
  • Position the router securely and limit the range of access. Do not place your router in a location where anyone can plug in a network cable to gain access. Try to position it where the wireless signal only reaches the locations where you want access.
  • Use a firewall. A firewall is a network security system that monitors and controls incoming and outgoing traffic based on predetermined security rules. It establishes a barrier between your internal network and the outside Internet. Your operating system and/or security software likely comes with a pre-installed firewall. Make sure it is turned on.

 


How To: Spot A Phishing Email
Posted By: Tanner Clark

Phishing & Suspicious Email


What Is Phishing?

Phishing is an online attempt to gain sensitive information (login info, credit card details, money, etc.). Criminals use malicious email to gain access to your personal and financial information, as well as sensitive business information and resources. They also use these to infect computers with ransomware. Malicious email often uses urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors.

Phone calls can also be used for fraudulent purposes. See Phone Scams and Voice Phishing (Vishing) for more tips on avoiding phone phishing. 

Resources:  See Cofense: How to Spot a Phish  and Phishing and Social Media

 

How to Avoid Getting Caught in the Phishing Net:

  • Always be suspicious of high emotion emails  Phishing emails bait the hook with our emotions to get in the way of our common sense.   Anything that targets a fear/panic response (like warnings of stolen information), tickles your curiosity, incites excitement (like "You've won!), and usually offer a "Click Here" option for a quick convenient solution.  When in doubt, don't.
  • Check for spelling and grammar mistakes  Emails that are swimming upstream are usually from outside the US and are riddled with spelling mistakes, bad grammar and phrases Americans usually do not use.
  • Look but don't nibble  Hover your mouse over any links embedded in the body of the email (see example below).  If the link address looks weird, don't click on it.  
  • Don't click on attachments   Phisher-men may use harmful attachments that contain viruses or malware.  Malware can damage files on your computer, steal passwords or spy on you without your knowledge.  Don't open any attachments you weren't expecting.  When in doubt, call the person the email is supposedly from.
  • Check out the signature  Lack of details about the signer or how you can contact the company strongly suggests a phish.  Legitimate businesses always provide contact details.
  • Don't give up personal information  Legitimate banks and most other companies will never ask for personal credentials via email. 
  • Don't trust the display name  This fraudulent email, once delivered, appears to be from a legitimate company because most user inboxes only present the display name.  Don't trust the display name.  Check the email address in the header From: - if it looks suspicious, don't open the email.  

Example:  Display name is AIG Direct, but the domain name refers to the email server and @rixoblalkangrill.com does not match the company it claims to come from. 
Related image



Examples of Emails that smell Phishy

 Related image

Clues that indicate this email is fraudulent:

  • It directs you to a non-business website (URL - the webpage address). Hover your mouse over the link to see the actual address you'll be directed to. In this case, the URL (webpage address) is clearly not a legitimate amazon web-page. Don't click the link if it looks wrong to you. (This screenshot does not show that the URL appears in the lower left corner of the window. Different email programs may show the URL in different locations.)
  • It asks you to validate your account or it will expire.  Reputable companies will never ask you to validate or verify your account. 
  • The "From" address is fake. Even though the message above looks it came from a Amazon address, it didn't. Beware, though, because criminals can forge the "From" addresses and actually hack into an emails. If it looks Phishy, make a phone call!

 

Still Have Doubts?

If you aren't sure, contact the Runbiz Service Portal.

 

Where to Report Phish

  • Phishes that appear to impersonate a Runbiz address or service: Send the entire message—with full email headers if possible—to your service technician when you report the email on the Runbiz Service Portal.
      
    • In the message you would like to report, click the down arrow next to the Reply arrow and select Show original.
    • In the Original Message screen, click Download Original to download the page as a .txt file.
    • Compose a new message, attach the file you downloaded, and send the new message and attachment when notifying the Runbiz Support Portal.
  • If you use Google Mail, report the phish to Google by using the report phishing option.
  • If you receive a phish impersonating another institution or business: If you receive a phish impersonating a bank, retailer, or other institution, please consider contacting them to let them know.  

If You Get Caught

If you gave personal information in response to a phishing email or on a suspicious webpage, your account may be compromised.

 


How To: Create A Great Password
Posted By: Tanner Clark

 

How to Create a Great Password

Written By Rick Pabst

Runbiz Support Engineer


We’ve all been trained to use passwords that are hard to remember and subsequently, hard to type. Because of this, we make them as short as possible. But here’s the kicker... Length is your best friend when it comes to passwords.

Here’s a new way to think about passwords.

Use words, phrases, or short sentences for your passwords. e.g. Lyrics to your favorite song, a saying you enjoy.

Here are a few examples of great passwords:

  • I like Fridays! (15 characters)
  • Pie > Cake. (11 characters)
  • Is this the real life? (22 characters)
  • Fireandraindance1 (17 Characters)
  • Sunshineonmyshoulders5 (22 characters)
  • Sunshine on my shoulders. (25 characters)

 

Easy to remember. Easy to type. Nice and long, which makes them strong.

Some systems won’t let you use spaces, and some systems will limit how long your password can be. Can you imagine having that as a problem? Your password is too long!

Just avoid using personal information! Steer clear of birthdays, phone numbers, names, etc.

Apply these tips, and you’ll be the envy of the security minded everywhere when you quickly and easily type your impenetrably long password.