Business
Focused
Technology

Keyboard Shortcuts – Get the most out of your PC or Mac

This month, we thought we would share a couple of keyboard shortcuts that you may be able to take advantage of.
There are keyboard shortcuts for doing almost anything in Windows.  Below are the ones we personally use the most often:
 

Alt+Tab Switch between open programs
Alt+F4 Close current window
Backspace Go to previous webpage (Chrome or Internet Explorer)
Ctrl+Z and Ctrl+Y Undo an action and redo an action
Ctrl+C and Ctrl+V Copy and Paste
Ctrl+S Save current document (Word, Excel, etc)
Windows Logo Key+D Show your desktop
Windows Logo Key+L Lock your screen or switch accounts
Windows Logo Key+Tab Show all your open programs

 
You can find all of the shortcuts for windows here: Click Here
For Mac OS:  Click Here
 
Don Dawson
President
IT360, Inc.

Principal Owner, Marketing Firm

Bringing IT360 on as our technology services “department” was one of the smartest business decisions we’ve made. Over the years, we’ve tried various similar services and have also hired internal IT staff, and we’ve never felt confident that we were adequately supported. IT360 has changed all that. They not only provide proactive, comprehensive technical support and consulting, they engage with us in a way that feels like they are part of our company…a true business partner.

Principal Owner, Marketing Firm

Recent
Technology News

IT 360 News
Threats and Infrastructure

From Arctic Wolf SUMMARY On February 7, 2024, CISA issued an advisory detailing their discoveries concerning state-sponsored cyber actors linked to the People’s Republic of China (PRC). Notably, the PRC-affiliated threat actor, Volt Typhoon, is actively engaged in efforts to infiltrate IT networks, with the potential aim of launching cyberattacks on vital U.S. infrastructure in […]

Read more
IT 360 News
Multi-Factor Authentication

By Cybersecurity & Infrastructure Security Agency OVERVIEW Multi-factor authentication (MFA) is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. MFA increases security because even if one authenticator becomes compromised, unauthorized users […]

Read more