Questions to Ask about That Suspicious Text
A suspicious text may be an obvious cyberattack, but if you’re unsure, here are some questions to help you. Continue reading Questions to Ask about That Suspicious Text
A suspicious text may be an obvious cyberattack, but if you’re unsure, here are some questions to help you. Continue reading Questions to Ask about That Suspicious Text
If your organization has provided specific fonts for branding, here’s how to install them on your system. Continue reading How to Install New Fonts
Letters, emails, and phone calls sometimes bring sad news. The loss of a spouse, a parent, a brother, a child. I hope this post helps you minister to your grieving ministry partner. Continue reading When Your Ministry Partner Is Grieving
I’m continuing to suggest ideas for you to prepare for the year ahead. Pick out what is relevant to you. Certainly, fit the ideas into your time constraints. I recommend doing the tasks in this four-part series in January or February. Continue reading Your January Guide: Part 2 of 4
I looked through my past January posts and decided I wanted to write something that wouldn’t overwhelm you. If you spend January in reflection and at a slower pace, save my ideas for February. Continue reading Your January Guide: Part 1 of 4
This post will help you learn the ropes to navigate a breach. You’ll need to clean up accounts, emails, and passwords. Continue reading How to Navigate a Data Breach