Would your employees recognize a phishing email before clicking? We ran a live phishing simulation using a fake DHL email. For some clients, the click rate reached over 30% — with some employees even entering their credentials, unknowingly exposing sensitive data....
Modern Workplace
Microsoft Teams Live Chat: Features & Real-World Use Cases
Could your business benefit from the new MS Teams Live Chat? Imagine providing instant customer support directly through your website—efficient, accessible, and easy to manage. Microsoft Teams Live Chat makes it possible, offering a practical solution to one of...
Should You Upgrade to Windows 11 Before Microsoft’s 2025 Deadline?
Microsoft has set October 14, 2025, as the official end-of-support date for Windows 10, leaving many users wondering: Should I upgrade to Windows 11 now or wait? Windows 11 brings a refreshed interface, improved security, and AI-powered features, but is it worth...
We’re Now an Acronis Platinum Partner!
We’re pleased to share that CloudConnected.nl is now an Acronis Platinum Partner. This is the highest level of recognition from Acronis, a leader in data protection and cybersecurity. For our clients, this means access to industry-leading backup, recovery, and cyber...
Starting with New Microsoft Planner? Our 10 Planner Tips
Still using Excel for project management and tasks? Microsoft Planner might already be included in your Microsoft 365 license. Making the switch is easy and brings many benefits. In Microsoft Teams, you can add Planner to your channels, allowing everyone to discuss...
How to Handle Cyber Attacks in the Netherlands in 2024
In 2024, the Netherlands has become a hotspot for cyber attacks. As one of Europe's leading digital economies, it faces increased risks from hackers targeting businesses of all sizes. Understanding these risks and knowing how to protect your business has become...
Cyber Incident Response 101 for small businesses
Imagine, it's the end of a long work day and you're ready to go home. Just as you are about to leave, you find out that your e-mail data has been hacked and important data from your company has been stolen. As a small business, you may face this type of scenario due...
Cyber incident prevention best practices for small businesses
As the owner of a small business, you may think your company is "too small" to be targeted by cybercrime because you are not a large company worth millions of dollars. However, nothing could be further from the truth. Although the media mainly focus on attacks on...
Don’t settle for less than the best
There are several reasons why small and medium-sized businesses (SMEs) best fulfill their technology needs from one central location. One reason is that small businesses often have fewer resources. So it is essential to make the best use of resources. Another...
Why smart companies outsource their IT services
In today's business world, technology plays an important role in virtually every industry. Technology has forever changed the way we live, work, communicate and collaborate. Technology offers endless benefits to businesses. With technology, for example, you can...