Blog

Our Top Blog Posts of 2017

Written by PTG Team | December 26, 2017 2:00:00 PM Z

 2017 is coming to a close, and we’re counting down our top blogs post of the year. Most of these posts weren’t written in 2017, but continue to be our most popular posts.

Not surprisingly, most of these focus on Office 365. We’re happy to see a security-based blog on here! Cybercriminals often target businesses based on the technology they use and knowing the red flags and warning signs to look out for is a huge step in the right direction towards keeping your business secure.

 

5. How to turn names into email addresses in Excel

Manually reformatting data can be an incredibly tedious task. Thankfully, Excel can do a lot of reformatting for you with a formula or function. The hardest part is just knowing it exists. This blog teaches you how to take a list of names and turn it into a list of email addresses.

You may also like…

How to Separate Names into Columns in Excel: This blog post teaches how you to do the opposite – split one column into multiple, specifically with a list of names.

 

4. The Pros and Cons of Office 365 for Business

Office 365 can be an excellent tool for productivity, but it isn’t going to be right for everyone. This blog post breaks down the pros and cons to help you decide if it’s the right solution for your business.

You may also like…

Top 5 Mistakes Companies Make with Office 365: If you decide Office 365 IS the right tool for you, that doesn’t automatically mean it’s going to be successful. This post covers some of the mistakes we see companies make that lead to a bad experience with Office 365.

 

3. Watch Out for This Office 365 Phishing Email

This blog post covers a common phishing email targeting Office 365 users: a warning message saying the user's account has been suspended. It includes the red flags in the email and what real emails look like.

You may also like…

Watch Out for this Fake Office 365 Spam Message: This is another phishing email targeting Office 365 users. Unlikely the fake warning message, this one doesn’t try to scare you into clicking – it tries to blend in so you won’t be suspicious.

Four Types of Phishing Emails Targeting Businesses: This blog covers other types of phishing email targeting businesses. These can be especially damaging to small businesses, who don’t have the same cybersecurity resources as an enterprise, making them a target for cybercriminals.

 

2. Office 365 Home vs. Business

There are a few different types of Office 365 (and multiple plans within each of those), most noticeably Office 365 for businesses and Office 365 for personal use. This blog breaks down there differences between the two and explains why using home version won’t work for 99% of businesses.

You may also like…

How to Choose the Right Office 365 Plan for Your Business: There are a lot of Office 365 plans for businesses. It can be hard to figure out which is the right choice for you. This blog post gives you the steps to take to narrow down your options and pick a plan.

 

1. Office 2016 vs Office 365: What’s the difference?

This has been our most popular blog post for a few years now, and when you consider how confusing the Microsoft naming convention can be, it’s not surprising. There are a lot of programs and apps with similar names. This post breaks down the differences between Office 365 and Office 2016.

Earlier this year, Microsoft announced that Office 2019 will be released sometime in late 2018. The overall comparison will the same as this blog post, but the pricing may be different.

You may also like….

Microsoft 365 vs. Office 365: What’s the difference?: Remember what we said about confusing naming conventions and products with similar names? In mid-2017, Microsoft announced a new product called Microsoft 365 that combines Office 365, Windows 10, and Enterprise Mobility + Security. This blog post breaks down the specifics and the differences between the two products.

 

Some posts you may have missed…

These posts, published in 2017, didn’t make the top five, but we still think they should get your attention:

How to Improve Your Security with Multi-Factor Authentication: Multi-factor authentication (sometimes called two-factor authentication or dual factor authentication) is one of the best things you can do for your data security. This blog post explains how it works and why it’s so valuable.

Cyber Security in a Cloud World: Business and technology had fundamentally changed over the past decade or so. The way we think about cyber security needs to change, too. This blog details why and how.