Blog

The latest news from The Garden Shed

How Easy Is It to Guess Your Password?

It is a common understanding that passwords are supposed to protect our accounts. But how much does your designated password protect you and your[...]

Office 365 for the Real World: Webinar Replay + Notes

Have you ever wondered how other businesses utilise their business software? The Office 365 suite offers so much capability in powering up your[...]

How to Create a Modern Workplace that your Team Loves

One of the very cool benefits in my job here as Client Success Manager at Grassroots IT, other than the privilege of partnering with a wide variety of[...]

Why You Shouldn't Be Using Email as a Collaboration Tool

The email In-box can be a magical place. Once opened, it has the capability to soak up a good healthy chunk of your working day. I don’t think it’s an[...]

My Three Big Takeaways from the Small Business Download 2018

 
Last week I had the immense pleasure of hosting clients, partners and other members of our community at our annual learning event – The Small[...]

Microsoft Launches New Artificial Intelligence Features In Excel

 
It’s always an exciting time when the big guns roll out with  all  the convention centre light shows,  smoke effects and  hype. Microsoft Ignite[...]

The Power of Collaboration & In-person Connection

 
An IT colleague of ours recently posted a video on LinkedIn, discussing how she was in Brisbane to meet with her peer group. She commented that[...]

#Ask the Nerdherd: How Do I Keep my Business Operating When My Internet Goes Down?

We heavily depend on the internet these day, as many of us use cloud based services. If the internet going down means that business stops, this can be[...]

Building a Client-Focused Business

It doesn’t matter if you are selling nuts and bolts, complex financial or technical systems, a question keeping business owners of all sizes up at[...]

Three Reasons you need to enable Multi Factor Authentication (MFA) today

Multi-factor authentication (aka MFA, 2-factor authentication, 2fa and so on) is a highly recommended, additional layer of security for the user[...]

1 2 3 4 5
... 36 ?

Recent Posts