Keyholder Agreements
Keyholder Agreements – Building Security
The purpose of this article is to discuss the importance of keyholder agreements.
Read the Article
Approval Processes: Part 2
Approval Processes: Part 2 – Development
This article explains what steps are typically involved in the Approval Process and introduces Flowcharts.
Read the Article
Password Management: Part 3
Password Management: Part 3 – Managing the Program
The 3rd part in our series on password managers gives 4 tips for managing the password database program.
Read the Article
Password Management: Part 2
Password Management: Part 2 – Choosing a Program to Use
The 2nd part in our series on password management explains 4 criteria to watch for when choosing a password databank program and includes a few recommended programs.
Read the Article
Password Management: Part 1
Password Management: Part 1 – Why They’re Important
The 1st part in our series on password management explains why it is important to have a password databank.
Read the Article
Company Voicemails: Part 3
Company Voicemails: Part 3 – Recording
The 3rd part in this series gives tips for recording business voicemails and includes a template for voicemail scripts.
Read the Article
Company Voicemails: Part 2
Company Voicemails: Part 2 – Options
The 2nd part in this series explains different voicemail options for a business.
Read the Article
Excel 101: Part 2
Excel 101: Part 2 – Cell, Row and Column Adjustments
This article is written to provide a “how to” when adjusting cells, rows, and columns.
Read the Article
Excel 101: Part 1
Excel 101: Part 1 – Learning the Basics
This article is written to begin introducing you to Microsoft Excel, and why it is the preferred software in many organizations.
Read the Article