Blog
4 Employee Cyberthreat Traits
To succeed in today’s modern competitive business landscape, you need to...
4 Cyberthreats Small Businesses Need to Know
Data breaches have become more common in recent years, owing primarily to the...
Why Passwords are Your Business’s Weakest Point
In today's digital world, safeguarding...
Busting Four Popular Cybersecurity Myths
As the business world becomes increasingly digitized, you’ll have to tackle...
Connecticut’s New Approach to Improving Cybersecurity
Previously presented on Monday, November 8, 2021 | 12:00 p.m. EST A new...
Phishing Attacks: How to Recognize Them and Keep Business Data Safe
Cybercrime is on the rise, and hackers are using any opportunity to take...
Using Basic Arrays in Excel
An array is a type of formula that can perform multiple calculations on one or...
Working With Graphics in Microsoft Office
Pictures often speak louder than words and MS Office provides us with ample...
Cyber Security Tips – Pretexting
Pretexting is when the bad guys create a false scenario using a made-up...
Favorite Excel Features – Webinar
In this webinar Ronny will share some of her favorite Excel shortcuts, such...
Excel Logical Functions – Webinar
Some of the most common and powerful functions for Excel users are “logical...
U.S. Computer Connection recipient of 2018 Marcum Tech Top 40 Award
Stamford 09/18/18 - The Connecticut Technology Council (CTC) and Marcum LLP...