Best practices for working from home

Best practices for working from home

Many of us are now finding ourselves working from home, which has created unfamiliar terrain from what we’re accustomed to, but hackers — who are continuing their activities unabated — may see this time of uncertainty as an opportunity. That’s why you and your...

Take Control Remote Access Instructions

Take Control Remote Access Instructions   NOTE:  Firefox was used to make these instructions.  If you are using another browser like Chrome, Edge or Internet Explorer the screenshots may differ slightly. Login to https://proxycare.proxurve.com Click on the green...

Use Microsoft Authenticator with Office 365

If your organization is using 2-step verification for Office 365, the easiest verification method to use is Microsoft Authenticator. It’s just one click instead of typing in a 6-digit code. And if you travel, you won’t incur roaming fees when you use it....