5 Ways to Make Your Virtual Meetings More Effective

Just like with face-to-face meetings, virtual meetings need to be well planned and executed to maximize their usefulness. Here are five ways you can make your virtual meetings more effective.Read more

The End Is Near for These Productivity Apps

Soon many productivity apps will no longer be supported by Microsoft because they are reaching the end of their lifecycle. Find out which popular programs are affected and what your options are. Read more

3 Coronavirus-Themed Phishing Emails That Might Be Headed to Your Business

Nowadays, more than 80% of cyberattacks incorporate a coronavirus theme. Here are three real-life examples of Coronavirus-themed phishing emails that hackers sent specifically to businesses.Read more

Windows 10 Bug Is Causing Connectivity Problems on Remote Employees’ Computers

A connectivity bug is preventing certain apps from connecting to the Internet on some Windows 10 computers. Find out which machines are affected and how to get rid of it.Read more

5 Ways to Maintain Business Continuity During the Coronavirus Crisis

Staying in business during the coronavirus pandemic can be challenging. Here are five ways to help keep your employees healthy and your operations running. While some businesses are shutting down during the Coronavirus Disease 2019 (COVID-19) pandemic, many are remaining open. Staying operational in this new environment can be challenging, though. Companies face the real possibility of having many of having many of their employees become suddenly ill or having their computer systems become incapacitated. Here are 5 ways to help keep your employees and your operations running during the coronavirus crisis:

  1. Clean Frequently Touched Surfaces Often

COVID-19 is highly contagious. One way employees can get the virus is by touching a surface it is on and then touching their mouth, nose, or eyes. Thus, it is important for your business to regularly clean surfaces that are frequently touched. While some surfaces are obvious targets for cleaning (bathroom and breakroom surfaces), others are not (e.g., printer LED displays, elevator buttons, door knobs).

Businesses in non-healthcare settings can use the cleaning agents they normally use to clean frequently touched surfaces, according to the US Department of Health & Human Services' Centers for Disease Control and Prevention (CDC). However, if an employee has tested positive for COVID-19 or is suspected of having it, more stringent cleaning procedures are necessary.

Besides making sure that frequently touched surfaces in your business's common areas are cleaned regularly, you might also want to provide disposable wipes that employees can use to clean their desks, phones, computers, and peripherals (e.g., keyboard and mouse). With wipes readily available, employees will be more likely to keep their personal space and devices clean.


  1. Provide Guidance on How to Keep Viruses at Bay

One of the best defenses against COVID-19 and other viruses is good hand hygiene. Washing your hands with soap and water for at least 20 seconds kills the coronavirus, according to the World Health Organization (WHO). An alcohol-based hand sanitizer will also kill it, provided the hand sanitizer contains at least 60% alcohol. So, you should make sure the soap dispensers in your company are filled regularly. (It does not have to be anti-bacterial soap.) You might also want to place alcohol-based hand sanitizer in common areas where there are no faucets, such as reception areas and conference rooms.

Providing employees with guidance on how and when to wash their hands is just as important as providing the soap. Besides washing them for at least 20 seconds, there is a technique that people should use. The CDC recommends that companies instruct employees on when and how to wash their hands and put up posters to remind them to do so.


  1. Provide Guidance on How to Keep Another Type of Virus at Bay

Unfortunately, COVID-19 is not the only virus your company needs to worry about. The pandemic is prompting new cyberattacks. Hackers are playing on people's fears about the health crisis to trick them into installing computer viruses. For example, in March 2020, hackers pretended to be WHO officials in phishing emails. The emails urged recipients to open an attached Microsoft Word document that contained information on coronavirus precautions. However, the file also included malicious code that led to an infection by a Windows virus named TrickBot.

Getting infected with a computer virus like TrickBot while trying to deal with the COVID-19 crisis could spell disaster for a company. Thus, you should warn employees about the influx of phishing emails and other types of cyberattacks tied to COVID-19. You should also provide training on how to avoid becoming a cybercrime victim (e.g., how to spot phishing emails, how to check for deceptive links in emails) if you have not already done so.


  1. Hold Virtual Meetings Instead of In-Person Meetings

Virtual meetings have long been touted as a way to help companies save money and improve productivity. The coronavirus crisis has brought to light another important benefit of virtual meetings: They reduce employees' risk of exposure to COVID-19 while enabling them to communicate and interact with customers, business associates (e.g., supplier reps), and other employees. To participate in virtual meetings, employees typically only need a computing device, web camera (webcam), Internet connection, and video-teleconferencing solution (e.g., Microsoft Skype, Google Hangouts, GoToMeeting, Cisco Webex Meetings).


  1. Let Employees Telecommute to Work

Because of the coronavirus pandemic, health officials and government leaders are recommending social distancing — a strategy used to slow down the spread of contagious diseases like COVID-19. A key concept in this strategy is keeping space between people — the more space, the better. This reduces the chance that people will come in contact with someone who is knowingly or unknowingly infected with the coronavirus. The latter is important to keep in mind. People who are infected with mild symptoms might still come to work, thinking that they just have a cold. In some cases, people have no symptoms. One study of 450 coronavirus patients in China found that more than 10% of them were infected by someone who had the coronavirus but were asymptomatic.

One way to practice social distancing is to have employees work from home if possible. Using public cloud-based business and productivity apps (e.g., Microsoft Office 365, Google G Suite, Salesforce) can make the transition easier. However, you still need to set up systems to support those employees. For example, you need to provide a secure, reliable way for employees to connect to your business's computer systems, especially if they are using their own personal computing devices. One possible solution is to use a remote-access virtual private network (VPN).

If working at home is not an option, employees should follow another social distancing practice: maintaining a distance of six feet from each other. To encourage this, you should make sure that employees' desks and other work areas are six feet apart from each other. If spreading out is not possible, another option might be to implement flexible work hours (e.g., staggered shifts) to increase the physical distance between employees.


Change Is Not Easy — We're Here If You Need Help

These are only some of measures that companies can take to maintain business continuity during the coronavirus crisis. There are others, such as cross-training employees on essential business operations and developing an infectious disease outbreak response plan.

After you decide which measures you want to take, we can develop the IT infrastructure needed to support those changes. For example, we can help you select and implement a virtual meeting solution or set up secure home offices.

518432882 flickr photo by cambodia4kidsorg shared under a Creative Commons (BY) license

Going Remote on 1 Day Notice

The impact of COVID-19 is becoming harder for business owners to ignore. If you’re following the recommendations of the World Health Organization, Center for Disease Control, and your local governments; you’ve switched to a remote-based operation. Many businesses are trying to figure out how to go remote. Here are a few items to consider to prepare for a smooth transition.

  1. Equipment for Staff to Work at Home

How many businesses have an arsenal of extra laptops, desktops, monitors, and other tech equipment sitting on a shelf in case of an emergency? Owners are finding most of their staff no longer own computers, and have shifted to tablets and phones. 

Determine who has a home computer they can use for work purposes. What operating system is their home PC running? Is it a Windows or Apple computer? Do they need two monitors to maintain productivity at home?  Stores like Office Depot, are creating "work from home" packages that include ergonomic keyboards, mouse and other workstation tech equipment. Make sure to complete your research before making purchases and price compare other options.

How much in-office equipment can be transferred to your employees' home? In many cases, allowing staff to take their work system home, in its entirety, is the simple solution.  Consider drafting a simple Equipment Checkout Agreement for the staff and supervisor to sign, maintaining record of the company equipment leaving the building.

  1. VPN & Remote Capabilities

For Windows based users, setting up VPN access can be pivotal to continued productivity. The decision to go remote is being made quickly and difficult for staff to think of what will be needed to work from home over the next few weeks (or months.)  Transfer your files to your cloud solution if you have access from your home, or transfer to a secure Google Drive or similar method. Make sure your password key chain is accessible from your browser at home, or have the necessary access in the event you need to change passwords in order to regain access. 

Your network can be set up to allow VPN access. You’ll need to determine the number of ports first. Setting up 50 ports on your network because there are 50 employees that need to work from home now might not have enough bandwidth to support those 50 simultaneous users. Instead, consider setting up a limited access to a group of employees who can fetch what the rest of the team needs, as it arises. S & P Global dives deeper into the limitation of VPNs being exposed due to the coronavirus outbreak.

Creating a continuous flow of access to the network while the staff works from home will be pivotal to work flow production. 

  1. Software Access

If you’re only using web-based programs, your business is set up for a smooth transition to a virtual operation. If your business relies on installed software for vital functionality, complications are more likely to arise with a transition outside the office. Business owners should look to the setup and configuration of their software: servers, IPs and network configuration. 

There are issues that will arise after transitioning to a remote operation on short notice.  However, a smooth transition starts with equipment, access to data, and software. If you need any assistance with your home workstation, contact us and we will gladly assist.

workstation flickr photo by snDesignV11 shared under a Creative Commons (BY) license

Is 5G Safe?

Just like when microwave ovens and 4G services were introduced, the rollout of 5G services has sparked concerns about safety. Should you be concerned? Here are some things to keep in mind.

Just like when microwave ovens and 4G services were introduced, the rollout of 5G services has sparked concerns about safety. If you perform a web search, you will find many viewpoints on the topic. Some people are saying it’s harmless, while others are warning that it will cause cancer and other health issues. A common argument among the latter group is that 5G is dangerous because it travels over higher frequency radio waves. Another argument concerns what has been said in a certain report by the World Health Organization.

So, is 5G safe? To better answer this question for yourself, you need to be familiar with some basic science.

Electromagnetic Radiation 101

There is electromagnetic radiation everywhere around us. This radiation travels in waves and varies in the amount energy (aka strength) it has. The shorter the wavelength, the more energy it has — and the more dangerous it is. Some radiation is so strong that it can damage people’s cells and DNA, which increases the risk of developing cancer. This is referred to as ionizing radiation.

Radiation that does not damage cells or DNA is called non-ionizing radiation. However, even non-ionizing radiation has some health risks. Exposure to intense, direct amounts of it can result in tissue damage due to the heat generated.

Electromagnetic radiation causes electromagnetic fields (EMFs). These fields are broken down into two categories based on their frequency (i.e., number of waves per second):

  • Higher-frequency EMFs (e.g., x-rays, gamma rays)
  • Low- to mid-frequency EMFs (e.g., radio waves, microwaves, visible light)

EMFs in the ionizing radiation part of the electromagnetic spectrum — known as ionizing EMFs — include x-rays and gamma rays. The rest of the EMFs are referred to as non-ionizing EMFs. They include radio waves, microwaves, and visible light.

Where 5G Fits in and What It Means

As previously mentioned, a common argument among 5G opponents is that 5G is dangerous because it travels over higher frequency radio waves and therefore will increase the chances of getting cancer. The first part of this statement is true. The frequency of high-band 5G typically ranges from 24 to 40 gigahertz (GHz), which is a big step up from 4G LTE’s frequency of around 2.5 gHz.

However, the frequency of high-band 5G is far below the frequency of the various ionizing EMFs, which starts around 30 petahertz (PHz) — in other words, around 30 million gHz. Since a 5G radio wave is not an ionizing EMF, exposure to it won’t damage your cells or DNA, or increase your chance of developing cancer.

Plus, while exposure to intense, direct amounts of non-ionizing radiation can result in tissue damage, regulatory agencies around the world know about this issue and regulate it. For example, the US Federal Communications Commission (FCC) sets limits on how much humans can be exposed to radiofrequency emissions from cellphones, transmitters, and facilities.

2B or Not 2B

Another reason why some people believe that 5G is unsafe stems from a classification in a report by the World Health Organization’s International Agency for Research on Cancer (IARC). This agency conducts and coordinates research into the causes of cancer. After it researches whether a specific item causes cancer, it places it into one of the following cancer-risk categories:

  • Group 1: The agent is carcinogenic to humans.
  • Group 2A: The agent is probably carcinogenic to humans.
  • Group 2B: The agent is possibly carcinogenic to humans.
  • Group 3: The agent is not classifiable as to its carcinogenicity to humans.
  • Group 4: The agent is probably not carcinogenic to humans.

IARC classified radiofrequency electromagnetic radiation as 2B. This might sound alarming, but a rating of 2B basically means that there’s not enough evidence to either say it is or is not carcinogenic. Other items such as aloe vera extract, carpentry, gasoline, and even pickled vegetables are also classified as 2B by IARC.

The 2B classification also alludes to the need for more research, which is a good thing. Just because there is no undeniable proof either way right now does not mean that can’t change. Humans are always discovering new things and gaining a better understanding of the existing world around them.

The Answer

Two common reasons for claiming that 5G is unsafe — 5G’s higher frequencies and IARC’s 2B classification — turn out to be non-issues, which helps alleviate some of the fear surrounding 5G. These non-issues — combined with the fact that scientific consensus currently says we have nothing to worry about — means you do not have to forgo getting a new 5G phone if you want one. But it is always a good idea to keep an open mind in case any new developments arise in the future.

5G Netzwerk flickr photo by Christoph Scholz shared under a Creative Commons (BY-SA) license

5 Email Scams to Watch Out for During Tax Season

It is tax season in the United States, which means both businesses and individuals are at risk of being conned out of their money or data. Learn about five popular email scams that will likely make the rounds.

It is tax season in the United States — and cybercriminals all over the world know it. For them, it is time to ramp up efforts to scam people out of their money or data. Initially, hackers mainly targeted individual taxpayers, but that has changed. Nowadays, businesses are common marks as well.

Here are five popular email scams that cybercriminals have used in the past to steal personal data and money during tax season. Since the scams were successful in the past, hackers will likely use them again in the future.

  1. Emails Asking for Copies of IRS Forms

Businesses use W-2 forms to report employees’ earnings and tax withholdings to the US Internal Revenue Service (IRS), so cybercriminals often use these forms in their scams. Posing as an executive or another person in authority at a business, hackers send an email to the company’s payroll staff requesting copies of employees’ W-2 forms.

Many businesses have fallen victim to this scam, prompting the IRS to call it “one of the most dangerous phishing emails in the tax community”. The emails are very effective because cybercriminals take the time to study their marks and make preparations. For example, they usually spoof or hack the executive’s email account as well as personalize the W-2 request so it sounds plausible. That way, the payroll staff is less likely to question the email’s legitimacy.

With the recent release of the new IRS W-4 form, experts expect that cybercriminals will adapt this scam to request copies of W-4 forms. Like W-2 forms, W-4 forms contain employees’ social security numbers and other personal information, which hackers use to file fraudulent tax returns, steal people’s identities, or sell on the dark web.


  1. “Reminder” Emails with Links

In 2019, hackers launched many different types of IRS impersonation email scams. Here is how one common variation works: Pretending to be from the IRS, hackers send emails that contain subject lines like “Automatic Income Tax Reminder” or “Electronic Tax Return Reminder”. These unsolicited emails contain links to spoofed IRS websites and a password that recipients need to use to access files about their tax accounts, electronic returns, or refunds on those sites.

People who fall for the scam have their computers infected with various types of malware. For instance, the malware might be a remote-access tool that lets hackers take control of their computer or a keylogger that tracks their keystrokes.

  1. “Tax Transcript” Emails with Attachments

In another common impersonation scam, cybercriminals send out phishing emails pretending to be from “IRS Online”, a non-existent entity. The emails contained subject lines that include the phrase “tax transcript” (the IRS’s term for a tax return summary) as well as attachments named “Tax Account Transcript” or something similar.

The attachments are laced with Emotet, a banking trojan used to steal sensitive information. Once on a computer, it is designed to spread to other machines in a local network. As a result, Emotet is one of the most costly and destructive malware programs affecting organizations, according to the Cybersecurity and Infrastructure Security Agency (CISA), which is part of the US Department of Homeland Security.

  1. Emails from the Taxpayer Advocacy Panel

Although the Taxpayer Advocacy Panel (TAP) email scam first appeared in 2016, it has continued to pop up in email inboxes every year since then. In this scam, people receive emails supposedly from the Taxpayer Advocacy Panel (TAP) about their tax refunds. These emails try to trick recipients into clicking a link that leads them to a site where they are asked to provide personal and financial information.

Although TAP is a real group, it is not part of the IRS. It is a Federal Advisory Committee under the authority of the US Department of the Treasury. TAP members are volunteers who listen to taxpayers’ concerns to identify common issues and make recommendations for improving the IRS service and customer satisfaction. TAP members are not involved in providing tax refunds — nor do they request personal or financial information from taxpayers.

  1. Scams Targeting Tax Professionals

Cybercriminals are increasingly targeting tax accountants and other professionals working in tax preparers’ offices. Hackers often use phishing emails to trick the tax professionals into providing their account passwords, Electronic Filing Identification Numbers (EFINs), Centralized Authorization File (CAF) numbers, and other sensitive data. The cybercriminals then use this information to access the systems in which the tax firms store their clients’ data. Once inside, the hackers steal the clients’ personal information, including their social security numbers. The cybercriminals often sell this data on the dark web. They also might use it to file fraudulent tax returns or steal people’s identities.

Don’t Become the Next Victim

While email scams are common during tax season, you and your employees can take some simple measures to avoid becoming the next victim. Most important is knowing how the IRS does and does not contact taxpayers.

The IRS does not initiate contact with taxpayers by email, text messages, or social media channels. Instead, it typically uses mail. “The IRS initiates most contacts with taxpayers through regular mail delivered by the U.S. Postal Service. However, there are special circumstances in which the IRS will call or come to a home or business,” according to the IRS. “Even then, taxpayers will generally first receive a letter or sometimes more than one letter, often called notices, from the IRS in the mail.”

taxes flickr photo by mikecohen1872 shared under a Creative Commons (BY) license

5G: The Race is On

In the United States, the four main wireless carriers are rolling out 5G services. Find out what they are offering and how fast their 5G service might be.

The race to 5G has started in earnest around the world. In the United States, the four main wireless carriers — AT&T, Sprint, T-Mobile, and Verizon — are rolling out 5G services.

Although 5G has several important advantages over 4G (e.g., lower latency, more bandwidth), the main selling point the carriers are touting is 5G’s fast speed. How fast is it? Surprisingly, that is a tough question to answer. Many factors affect the speed of a 5G connection, such as how the signals are being transmitted and the type of compression technology being employed. The most important factor, though, is the frequency band being used.

The 5G Frequency Bands

Like its predecessors, 5G uses radio waves, which are part of the electromagnetic spectrum. Radio waves have different frequencies. The radio waves being used to deliver 5G cellular service fall into three frequency bands:

  • Low band
  • Mid band, which is sometimes referred to as the sub-6 GHz (0r sub 6) band because the frequencies are less than 6 gigahertz (GHz)
  • High band, which is often referred to as the millimeter wave (mmWave) band because the wavelengths range from 1 to 10 millimeters

The radio waves in these three frequency bands have different traits, as Table 1 shows. In general, radio waves with higher frequencies are faster than radio waves with lower frequencies, but the speed comes at a price. Radio waves with higher frequencies have a shorter range than radio waves with lower-frequencies. For example, mmWaves have the fastest speeds, but their range is only a mile or less. Plus, they cannot easily travel through some objects such as buildings, according to IEEE. They can even be absorbed by foliage and rain – a phenomenon known as rain fade.

Table 1. Comparison of the 5G Frequency Bands in the United States

  High band

(aka mmWave band)

Mid band

(aka sub-6 GHz band)


Low band

Frequency 24 GHz and higher Between 1 GHz and 6 GHz Below 1 GHz (600 MHz to 900 MHz)
Download speed Super fast (in the real world, 1 to 3 Gbps; theoretically can reach 10 Gbps) Fast (100 to 900 Mbps) Not as fast (30 to 250 Mbps)
Range Short (1 mile or less) Medium (several miles) Long (hundreds of square miles)
Ability of radio waves to travel through objects Cannot travel through some types of objects (e.g., buildings) Can travel through most objects Can travel through almost anything

Wireless carriers are using various technologies to offset the mmWave limitations. For example, they are using beamforming, small cells, and massive MIMO to deal with its short ranges and inability to travel through buildings.

The Carriers and Their Bands

Eventually, all four major wireless carriers might include all three frequency bands in their 5G services, but that is not the case right now. Here are the types of 5G coverage they decided to offer in the short term and how far along they are in providing it:

  • Verizon is concentrating on providing high-band 5G coverage. It has already rolled it out to consumers in more than 30 cities. In addition, it has set up high-band 5G networks at several business locations, including a shipyard and 16 football stadiums.
  • T-Mobile has rolled out low-band 5G coverage to more than 200 million people nationwide in December 2019. It is planning to add mid-band coverage if its merger with Sprint goes through.
  • Sprint has rolled out both low-band and mid-band 5G coverage to consumers in nine cities.
  • AT&T is providing high-band coverage to densely populated areas in 21 cities. That number will rise to 30 in early 2020. For suburban and rural locations, it is in the process of rolling out low-band coverage nationwide.

This is only a snapshot of the current 5G services being offered by the four wireless carriers. The numbers and locations covered will no doubt change as the 5G race continues in the next few years.

It is important to keep in mind that a lot of existing and new technologies are involved in providing 5G services (especially when using mmWaves), so there will likely be bumps along the way. For example, when mmWave coverage is first introduced in a city, there might be good coverage in one area (e.g., downtown) but spotty coverage in other areas.

Keep the Bands in Mind

If you are interested in getting a 5G mobile device for personal or business use, it is important to do your homework first. You need to research the carriers to find out what 5G frequency bands they use, where their cell towers are located (now and in the near future), and the mobile devices they offer. That way, you can select a 5G service that best meets your needs.

5G Netzwerk Geschwindigkeit – orange ts – it flickr photo by Christoph Scholz shared under a Creative Commons (BY-SA) license

Here’s What You Can Do If You Aren’t Ready to Say Goodbye to Windows 7

Windows 7 is reaching the end of its life cycle on January 14, 2020. Here are your options if you want to keep using it.

The sun is setting on Windows 7. If you are still using this old but reliable workhorse in your business, it might be time to say goodbye and let it ride off into the sunset. However, that’s not always an option.

Although you can still use Windows 7 after it reaches the end of it life cycle on January 14, 2020, it is risky to do so. That’s because Microsoft will no longer provide free security updates or product support for this operating system or its built-in web browser, Internet Explorer. Using unpatched software will leave your business’s computers more susceptible to cyberattacks.

Fortunately, Microsoft is offering several options for companies still using Windows 7 when it reaches the end of its lifecycle. The options include:

  • Purchasing Extended Security Updates
  • Using Microsoft’s Windows Virtual Desktop service

Extended Security Updates

Microsoft is offering Extended Security Updates to any business using Windows 7 Professional or Windows 7 Enterprise through January 2023. You do not need to have a volume licensing agreement to take advantage of this offer.

You can purchase Extended Security Updates through Microsoft’s Cloud Solution Provider program. The updates, which will be delivered through the normal update delivery processes, will include patches for security issues discovered in the operating system and its components (including Internet Explorer). They will not include any bug fixes (i.e., patches for non-security issues such as glitchy functions), feature enhancements, or technical support.

The Extended Security Updates are sold on a per-device basis, so you only have to purchase the updates for the computers that need them. Similarly, you only have to purchase the updates for the timespan needed, as the updates will be sold in three 12-month increments (2020, 2021, and 2022). For instance, if you plan on updating your computers in 2021, you can purchase security updates for 2020 only. However, the security updates are cumulative, so continuous coverage is necessary. This means that you cannot, for example, just pay for the 2022 updates. If you buy the updates for the first time in the second or third year, you will have to pay for the preceding years.

Microsoft has not publicly released the price list, but sources note that the Extended Security Updates for Windows 7 Enterprise will cost $25 per device the first year, $50 per device the second year, and $100 per device the third year. Updates for Windows 7 Pro will cost $50 per device the first year, $100 per device the second, and $200 per device the third year.

Windows Virtual Desktop Service

Windows Virtual Desktop is a desktop and app virtualization service that runs in the Microsoft Azure cloud. You can virtualize Windows 7 and Windows 10 desktops as well as Microsoft and third-party apps.

Businesses virtualizing Windows 7 desktops will be provided with free Extended Security Updates through January 2023, according to Microsoft. Not having to worry about annual increases in fees for these updates means you will feel less pressured to rush through a migration. Plus, as desktops are upgraded, you will be able to manage both the Windows 7 and Windows 10 desktops using a unified management approach.

Being able to virtualize Windows 7 desktops can also come in handy if you have migrated to Windows 10, but have a few computers you cannot upgrade because the machines are running legacy business apps that are incompatible with Windows 10. With Windows Virtual Desktop, you can keep your Windows 10 computers local while running your legacy apps on virtualized Windows 7 desktops in the cloud.

You can use Windows Virtual Desktop to access Windows 7 Enterprise and Windows 10 Enterprise desktops and apps for no additional cost if you have one of the eligible licenses. You can find out which licenses are eligible on the “Windows Virtual Desktop pricing” web page.

To use Windows Virtual Desktop, you also need to have an Azure subscription. In addition, you need to have Azure Active Directory that is in sync with Windows Server Active Directory through either Azure AD Connect or Azure AD Domain Services.

Need More Information or Advice?

If your business is still using Windows 7, we can go over your options in more detail so you can make the best choice for your business based on its needs. Afterward, we will help you carry out that decision.

Windows 7 – Splash Screen” (CC BY-SA 2.0) by Brent Schmidt