Support Ticket Priorities | 278

Have you ever submitted a CreekHelp support ticket?  You know that one of the required fields is to select a [Priority] for your ticket. Have you wondered what the priorities mean and how quick you may receive help? Hopefully we can help explain a bit of that today! The following Priority Levels exist: Today Critical […]

Read More

Top 5 Meta Scamps | 277

Facebook, now known as Meta, has over a billion users. That’s a lot of people who check their accounts regularly! Cybercriminals take advantage of Meta’s popularity to try to trick users every day. Here are the top five scams that cybercriminals use on Meta: Who Viewed Your Profile: This scam tricks you by telling you […]

Read More

Accessing the Campus Marketing Doc | 276

A Campus Marketing Document serves as a strategic guide for ensuring each campus is equipped with the necessary promotional items during a series. Each document includes detailed instructions on what items to distribute, where to place signage, and other campus-specific marketing needs. It’s your one-stop resource for a well-executed marketing strategy at your campus. The […]

Read More

Submitting a Support Ticket | 275

This article explores best practices for creating support tickets that communicate your concerns accurately and streamline the resolution process. Here are some best practices to follow: Submit Only One Issue Per Ticket This allows for clear and focused communication between the submitter and the support team. Focusing on one issue enables the support team to […]

Read More

Mission Trip Blog Subscriptions | 274

Did you know that each of our Mission Trips write a blog updating their friends and family on their journey through the Mission Trips? Sometimes these blogs are only written & sent the week of the trip. Other times the blog might be sent out occasionally leading up to the trip. Are you interested? Would […]

Read More

Evil Twin Wifi | 273

Beware of “Evil Twin” Wi-Fi Connections Free Wi-Fi is widely available in many areas and businesses. Many people connect to these free networks while traveling or away from home. One particular scam called the “evil twin” attack involves a cybercriminal using a device to set up a fake Wi-Fi access point where you typically use […]

Read More

Captcha | 272

Verification Prompts Lead to Malware We are all used to following directions on websites to prove that we are “not a robot”. But a new tactic is tricking users into infecting their own computers by following fake “CAPTCHA” instructions to prove they are a human. These attacks play out in the following way: Text is […]

Read More

Create Strong Passwords | 271

Data breaches are more common now than ever before. A data breach is an intentional or unintentional leak of sensitive information. At least one of your current or old passwords has likely been exposed by a data breach. If your passwords are exposed, cybercriminals can buy them and gain unlimited access to your accounts and […]

Read More

Intern Blog Subscriptions | 270

Did you know that each of our interns write a monthly blog updating their friends and family on their journey through the internship program? When an intern writes their blog, it is emailed out the following Monday at 9 am. Are you interested? Would you like to subscribe to an intern’s blog entry? Navigate to […]

Read More

Ministry Calendar | 269

Did you know that Teamwork Projects offers a calendar option? While the calendar within Teamwork can be filled with lots of information and could be overwhelming, our goal today is to show a quick way to filter down to specific areas of the calendar. Note: Each item on the calendar is assigned to an [Event-Type]. […]

Read More