Category: Blog

Jun 23, 2022

Safety Net Named to Prestigious 2022 MSP 501 List

We are honored to share some great news!  Safety Net has been named as one of the world’s premier managed service providers (MSPs) in the prestigious 2022 Channel Futures MSP 501 rankings. Safety Net has been selected as one of the technology industry’s top-performing providers of managed services by the editors of Channel Futures. For […]

Read
Jun 03, 2022

3 Feature Enhancements for Microsoft Teams

As with all things Microsoft, their communication platform, Teams, continues to evolve for a better user experience.  Any successful software company will release new features or fixes to address frustrations felt by those who regularly use it, or just a means of improving their product.  Microsoft has done just that with these three feature enhancements […]

Read
Feb 14, 2022

Safety Net Named as a Top MSP for SMB IT Support

2022 MSP 500 – Pioneer 250 Safety Net, a Managed Service Provider in Farmington Hills and Traverse City, Michigan has been named by CRN®, a brand of The Channel Company, to its 2022 Managed Service Provider (MSP) 500 list in the Pioneer 250 category, making them a top MSP for SMB.  The Pioneer 250 category […]

Read
Feb 11, 2022

Clean Out Your Computer Day 2022

Since 2000, the second Monday in February has been designated “Clean Out Your Computer” day.  While most organizations have a network in place that includes shared drives and file storage, there are still some things you can do to tidy up your computer and declutter your electronic world. Desktops are not Dumpsters A simple way […]

Read
Lighting striking tall buildings
Jan 28, 2022

10 Steps to a Successful Business Continuity Program

Creating, practicing, and maintaining a successful Business Continuity Management (BCM) program requires detailed documentation, diligence, and discipline. It is an involved process that will only succeed when you have the right buy-in, and the right resources working together to develop, implement, and audit it. “Business Continuity Planning can be described as a three-legged stool,” says […]

Read
Dec 15, 2021

Microsoft Office 365 (M365) Quarantined Message Scam

Important information about quarantined message phishing from our partners at KnowBe4: In a new scam, cybercriminals spoof Microsoft Office 365 by using the email address quarantine[at]messaging[dot]microsoft[dot]com to send you a spam notification. The fake notification claims that a seemingly important email with the subject line “[Your Organization’s Domain] Adjustment: Transaction Expenses Q3 UPDATE” has been […]

Read
Dec 03, 2021

A New Scam – Order Confirmation Emails

If you’re shopping online for the holidays, you will receive order confirmation emails.  Unfortunately, cybercriminals have found yet another way to take advantage of generous gift givers who purchase presents online. What Order Confirmation?! In a new scam, the bad guys of the cyber world impersonate Amazon and send fake order confirmation emails.  Their goal?  […]

Read
Nov 24, 2021

Business vs Home Computers – Read Before you Shop!

Black Friday and Cyber Monday are known for amazing deals that bring people out in droves.  Electronics tend to be popular big-ticket items for holiday shoppers.  In the days following Thanksgiving, you’re likely to save $$$ on a new laptop or PC, which is great…. if it is intended for personal use.  Need new business […]

Read
Data Loss: 5 Scenarios
Oct 27, 2021

Data Loss: 5 Scenarios to Consider

As businesses shift resources to the cloud, Microsoft 365 (previously known as Office 365) is quickly becoming the standard. Cloud-based software can save your organization money and downsize your premise server environment, but it can also lead to a false sense of security if you assume Microsoft will handle all your data retention and recovery […]

Read
Oct 05, 2021

Digital Security at Home

As the internet and “cloud” all become more and more ingrained with our day-to-day lives, we may forget to stop and take a minute to think about how we approach digital security with our own personal information. You may think you do not have anything a hacker would want to steal, but remember, most attacks […]

Read