Blog

business downtime

The Cost of Downtime in Business

Downtime is costly for all businesses, but it can deliver a particularly noticeable blow to small and mid-sized businesses. And the costs of downtime continue to rise. Learn how to ...
Read more
caught in a social Engineering attack

Social Engineering: Everything You Need to Know

What is one of the fastest-growing cyberthreats? Social engineering attacks. In today's post, we will look at four different types of social engineering attacks. Then, you’ll learn how to avoid ...
Read more
Windows Shortcuts

Our Favorite Microsoft Windows Shortcuts

We’ve asked our incredible staff what shortcuts their favorites are. With help from our CEO, Ari Santiago, to our support techs, we compiled a list of some stellar Windows shortcuts.
Read more

Paul’s Perspective – Mind The MFA & Why Multi-factor Authentication is Critical

It's important to educate your team on what MFA is protecting against in the first place, recognize the rise of this type of attack tactic on the MFA process, and ...
Read more
how to spot a phishing email

How to Identify a Phishing Email (with 3 Examples)

Learn how to identify a phishing email and what to do once that phishing email is in your inbox.
Read more
Microsoft Teams search

How to Search (for Everything) in Microsoft Teams

Searching for chats in Microsoft Teams is straightforward. But like all Microsoft products, there's a lot of functionality jammed-packed into a single search bar.
Read more

Paul’s Perspective – New Year, New Scams

As we see the complexity of fraudulent activity continue to escalate, remember that our team at CompassMSP are here to answer your questions and assist you in the tireless work ...
Read more
How to Use Microsoft Teams Chat

How to Use Chat in Microsoft Teams

Whether you want to chat with your entire team or have a private conversation with someone, Microsoft Teams can make it happen. Learn how to do it all in this ...
Read more
How to create a strong password

How to Create Strong Passwords (And Remember Them)

What is the first line of defense against a cyberattack? A password. Learn how to create a strong password.
Read more
© 2022 CompassMSP All Rights Reserved.