cloud

A blue and white graphic contains a white file folder surrounded by padlocks to represent secure files.

How to Secure and Control the Use of Documents

To help you determine the level of security you have and need, here are three layers to consider: Microsoft 365’s built-in security features, additional security options that enhance what Microsoft offers out of the box, and advanced security options to address the needs of regulatory requirements like HIPAA (Health Insurance Portability and Accountability Act) and CMMC.

ID: A white woman with dark hair and glasses sits at a laptop.

Top Tech Trends for 2022

It can be hard to stay up to date with ever-changing technology. As we enter the final months of 2021, it is time to consider what technologies you should adopt in the coming year. TechHouse is here to help. 

ID: A glass sphere is held in front of a city skyline, warping the skyline within the sphere.

How to Optimize Your Microsoft 365 Business Premium Security Features

Now that you’ve purchased Microsoft 365 Business Premium for your organization, let’s look at what comes with this bundled subscription. Microsoft 365 Business Premium combines a few other subscriptions: Microsoft 365 Business Standard, Enterprise Mobility + Security E3, Microsoft Defender for Office 365, and Windows 10/11 Pro.    Note that Microsoft 365 Business Premium licenses per user. Some of the features and services are tenant-wide; however, any user taking advantage of the features or services must have the same license or equivalent of that …

How to Optimize Your Microsoft 365 Business Premium Security Features Read More »

ID: A fishing hook tugs the cord of a computer mouse.

Here’s What You Need to Know About Phishing

What is phishing? And why is it dangerous? Read on to find out.   The first widely known phishing attack occurred in 1996 when hackers breached aol.com. The perpetrators sent a phishing email, an email that attempts to solicit personal information, to aol.com email users. The email urged users to verify their accounts and provide billing information. Unfortunately, many aol.com users …

Here’s What You Need to Know About Phishing Read More »

ID: A user selects a graphic on a tablet.

How To Gain Control Of Your Data With Microsoft Data Analysis

We will walk through the basic features of Excel, PowerPivot, Power Query, and PowerBI to better understand these tools and how they can best help your organization. Along the way, we will build our vocabulary, including ETL, Data Types, Formulas, Aggregations, the role of a few languages used in Analysis (SQL, M, DAX), the benefits of visualizations vs. paginated reports, and the power of transactional vs. analytical databases. With a firm understanding …

How To Gain Control Of Your Data With Microsoft Data Analysis Read More »