Our Latest Blog Articles

How to run a Daily Huddle using Microsoft Teams

With a team covering three countries, remote working is at the core of how Grassroots IT functions, and our daily huddle is crucial to maintaining a [...]

11 Ways to Stay Cyber Secure When Working from Home

The trend towards remote working and working from home has brought with it many opportunities and challenges for organizations of all sizes. These[...]

5 Tips for Successfully Outsourcing Your IT Support

A Managed Service Provider (MSP) can help your business stay up-to-date with the latest technology and remain competitive in today’s challenging[...]

The Essential Eight Cybersecurity Framework

Cyber-security threats and data breaches are becoming increasingly rampant, sophisticated and difficult to mitigate. Statistics from recent studies[...]

What is Microsoft Enterprise Management and Security?

With so many Microsoft products out there, many small business owners are left wondering how to choose the best Microsoft package for their unique[...]

Top 9 Ways to Secure Office 365 and Microsoft 365

Microsoft Office 365 has many security features and capabilities built in, however with a few simple steps you can greatly increase your cyber-security

My Three Big Takeaways from the Small Business Download 2018

 
Last week I had the immense pleasure of hosting clients, partners and other members of our community at our annual learning event – The Small[...]

Three Reasons you need to enable Multi Factor Authentication (MFA) today

Multi-factor authentication (aka MFA, 2-factor authentication, 2fa and so on) is a highly recommended, additional layer of security for the user[...]

#Ask the Nerdherd: How do I retrieve a permanently deleted email?

Have you had one of those moments when you were working in your Outlook and noticed that  something is missing, either an email or a contact, and then[...]

Why Aligning Your IT Strategy with Business Goals is Critical for Success

I recently threw a question out to a group of my professional peers, asking them what they saw as the benefits of aligning IT Strategy with Business[...]

1 2 3 4 5
... 19 ?