Recent Posts

Security | 2 minute read

Return-To Email Scam

What exactly does an e-mail scam look like? While they can vary in how they appear, the most common scams have become easy to detect. Here at Worksighted, we have seen a number of scams recently that take advantage of...
Read More

Security | 4 minute read

The #1 IT Security Threat to Michigan Businesses

In West Michigan, the greatest risk to security that comes to small, to mid-size businesses (SMBs), is without a doubt email-based threats. Here at Worksighted, we see various cyber threats daily, however, every day we see two main types of threats: “I need a favor” emails and phishing emails.
Read More

Blog | 3 minute read

A Worksighted Holiday Tradition

The holiday season drips with nostalgia for most of us. Decorating sugar cookies, cinnamon and spice candles, the movie Elf and cheesy potatoes are a few of my traditional nostalgia-triggers. Since coming to Worksighted 3 years ago, I have adopted...
Read More

Blog | 3 minute read

Why Use Outside IT help?

As a person who works in Sales, it’s amazing how often people tell me they’d hate to do what I do. “If I had to go into sales, my family would starve!” “I would hate to be a pushy salesperson,...
Read More

Tech Riffs | 7 minute watch

How To Do Microsoft To-Do

Microsoft To-Do keeps getting better and better with a growing list of integrations in Office 365. Killian gives a quick tour around in this episode of Tech Riffs. All right, go ahead and RSVP to the company party. Check. Go...
Read More

Tech Riffs | 4 minute watch

Shortcuts to Higher Productivity with Windows 10

One of the greatest keys to becoming a superhero in your organization is to have a deep understanding of the tools of your trade. In this episode, we concentrate on shortcuts for Windows 10. Taking time to learn these simple shortcuts can add up to hours worth of added productivity.
Read More

News | 2 minute read

PDL / OXY Data Breach

12/3/2019 Initial Info: On December 1st we were alerted of a large breach of information contained in the PDL and OXY database. The source of this data breach is still unknown. The details are still somewhat unclear, but here is...
Read More