Returning To The Office Checklist

Stay at home orders are starting to be lifted which means many businesses will have their employees come back to the office. It’s time to plan for the transition back into office life. Use this checklist to help plan your return.         Downloadable Return to Work Checklist

Read More »

Past Live Events

Joe and Chad give a live demonstration of Microsoft Teams. They show viewers how Teams works and all the possibilities that come with it. To attend our upcoming live events click here.  Our CEO, Joe Svoboda, and our Development Manager, Chad Miller give a presentation on technology and working from home. They discuss topics such…

Read More »

Stay Secure on Zoom

While social distancing is still in order, many are using Zoom for video conference calls and meetings. With the recent increase in Zoom’s popularity, hackers and trolls are taking advantage of the situation. Many are experiencing “Zoombombing” where unwanted users join a call and broadcast disruptive behavior. If you plan to use Zoom, we want…

Read More »

COVID-19 Cybersecurity Alert

Even a worldwide pandemic can’t put a stop to cybercriminals who take advantage of vulnerable people and businesses. As if the world needs another problem, there has been an increase in COVID-19 related cybercrimes. Please read the following so that you are aware of the situation and can prevent it from happening to you. The…

Read More »

COVID-19 Update

The health and well being of our employees and our client’s employees is our first priority. Providing prompt, expert support is a close second. We are closely monitoring the recommendations and restrictions by our local, state and federal government on a daily basis. Starting today, March 23, 2020, Saint Louis County (where we are based)…

Read More »

IT Security Guidelines for Remote Work

Many business continuity plans have been challenged in the wake of the 2020 COVID-19 outbreak. Companies across the globe are trying to figure out how to work remotely while also staying productive and maintain IT security. Whether your company has 5 or 5,000 employees, it’s important that everyone takes the correct preventative security measures in…

Read More »

Is your business prepared?

With the right systems in place, your entire business can still operate remotely. In preparation for possible office closings, we are proactively reaching out to our clients to make sure they are prepared. In the event, your employees may need to work from home for a sustained period of time and we want to ensure…

Read More »

West County EMS and Fire Protection District

“We needed a company that actually understood our business, cared about the outcome and wanted to virtually become a partner with us. We have that in The Miller Group.” West County EMS and Fire Protection District Overview: West County EMS and Fire Protection District were in the market for an IT firm that they could…

Read More »

Is your Netflix account safe?

With more than 148 million subscribers globally, Netflix is one of the most popular streaming services. Like anything else, where people and money are, criminals are as well.

Read More »

5 Ways to Protect Your Data in the Cloud

Cloud computing is now the norm — 95 percent of businesses worldwide are using at least one cloud service, according to a 2016 study. While there are many services that fall under cloud computing, businesses often use the cloud to store data. Although security experts note that storing data in the cloud is a relatively safe practice, businesses…

Read More »

How to Change the Default Font in Microsoft Word

When you create a new blank document in Microsoft Word, the application automatically sets the typeface to Calibri. This is convenient only if Calibri is the font you want to use. If it is not your preferred default font, you can change it. Changing the default typeface in Word 2010 and later versions is easy:…

Read More »

Office 365 & Ransomware: The Lurking Threat

For small to midsized businesses, Microsoft Windows-based systems remain dominant. Windows continues to be the operating system most widely used on desktops and laptops. And Microsoft Office remains the most widely used work office suite. So it’s no surprise that Windows systems remain the top target for ransomware, too. A stunning 100% of IT professionals…

Read More »

Heitkamp Masonry

“The Miller Group came in organized and explained things to my level which made the process much easier than it had ever been.” Overview: Heitkamp Masonry had been experiencing slow response and extremely poor communication from their previous IT provider. They recognized that the lack of support was affecting their business and knew it needed…

Read More »

All Volleyball

“Our downtime has become non-existent with the Miller Group… I would recommend The Miller Group to others in retail because simply put, they will fix your IT problems so you don’t have to worry about them anymore.” Overview: All Volleyball contacted The Miller Group right in the middle of a technology crisis… A crashed server…

Read More »

The Differences between Hubs, Switches, and Routers

In discussions about networking, you might find that the terms “hub”, “switch”, and “router” are being used interchangeably when they should not be. The reason for the confusion is understandable. Besides looking similar, all three devices pass along data traffic through connectors called ports. Plus, as these devices become more sophisticated, the functional differences between…

Read More »