10 min read

The Importance of Modern Technology in the Workplace

By Ingram Leedy on May 1, 2020

An innovative business on the cutting edge of technology is able to empower its remote workers, reap the cost-savings benefits of BYOD policies, and connect its employees no matter how and where they work. It can provide higher-quality products or services, enhance customer service and the user experience, and reduce waste while improving productivity for higher profit margins. All in all, properly utilizing technology in the workplace creates a competitive advantage. 

Topics: Empower Your Business New Ways to Work
4 min read

Why organizations should not want to survive, but thrive

By Ingram Leedy on March 12, 2020

There’s an old saying: “Nothing ventured, nothing gained.” In other words, if you don’t take risks, you won’t earn many worthwhile accomplishments. However, it’s often hard for people to take risks—especially when they’re in a big business where a lot of people’s livelihoods ride on these risks. The thing is, every decision is a risk.

Topics: Empower Your Business New Ways to Work
4 min read

Finding the Right Approach to Modernizing the Office

By Ingram Leedy on March 8, 2020

In a recent video blog, I sat down with Bill Sands to talk about why Protected Trust works so hard to supply custom solutions to our clients’ needs. In the video, Bill highlighted a story about his cousin, who had approached Protected Trust looking for a solution to modernize his office and meet business goals.

Topics: Empower Your Business New Ways to Work
3 min read

Why We Provide Clients with Tailored Solutions

By Ingram Leedy on March 6, 2020

I recently sat down with Bill Sands of the Protected Trust team and talked about what it is that clients need from their computing devices and software. What do they need so that they can achieve an “ideal state” for profitability and productivity?

Watch Us Discuss the Need for Tailored Services:

Topics: Empower Your Business
5 min read

Applying the As-a-Service Philosophy to Devices

By Ingram Leedy on March 5, 2020

While it might sound weird to lease your computer instead of buying it outright, the idea isn’t as far-fetched as you might think at first. In fact, many of those who read this are probably already doing it with their phones (assuming they have a typical cellular plan).

In today’s video, I sit down with Steven Goodman and Stephen Cornell to talk about the evolution of the “as-a-service” model, and how it benefits computers and other devices.

Topics: Empower Your Business New Ways to Work
4 min read

Does your computer reflect your company?

By Ingram Leedy on March 3, 2020

So, how did we go from software and services to hardware (and, more specifically, Microsoft Surface devices)? Here the story from the people who lived it.

Topics: Empower Your Business New Ways to Work
5 min read

Learning to Be Secure in the Cloud with a Real Phishing Example

By Ingram Leedy on February 26, 2020

Modern, cloud-based tools and technologies have become an inseparable part of modern life. Businesses need to be able to use these tools effectively to reach their target audiences, but security remains a major concern in the cloud.

Topics: Empower Your Business
7 min read

[Online Course] Does Your Team Need Training in Microsoft Teams?

By Ingram Leedy on February 25, 2020

Microsoft Teams is an incredibly useful collaboration and communication tool for modern businesses. By combining chat features, collaborative document editing for Microsoft Office files, meeting coordination, and built-in team calling features, Microsoft Teams provides a robust collaboration platform for any business—large or small.

Topics: Modern Tools Empower Your Business New Ways to Work
6 min read

9 Red Flags to Avoid Being a Phishing Victim

By Ingram Leedy on January 6, 2020

During a livestream, we aren't always able to cover everything on our agenda. As was the case in our livestream with NOC Manager Sean Jacobs when he took us through a live phishing attack from both the attacker's and victim's perspectives.

You can see part of the recorded livestream on the right. Though we were able to show what a phishing attack looks like and how easy it is to unwittingly give away your password to a malicious third-party, we missed the most important part: How to identify a phishing attack and what to do when you are being phished.

Well, Sean and I put our heads together. From the livestream demonstration, we came up with a list of 9 “Red Flags” to target that will help you determine whether an email is legitimate or it’s a phishing attack. Phishers are getting a lot more creative than you probably think. So, even though some of these may seem like no brainers, one of the “email flags” below could help you identify a phishing attack so you can avoid it. Let's get started!

Topics: Empower Your Business