Using free public WiFi at a coffee shop or an airport may be convenient, but it can also be dangerous. Most public places that offer free WiFi don’t use encryption to secure their WiFi networks. It’s important to remember that when you connect to public WiFi networks, you will be sharing the networks with other […]
Read MoreSend Group Leader Agreement | 221
Have you ever needed a quick way to send a DreamTeam member their Group Leader Agreement? We have made this easy for you! Follow these steps below: Open Rock & Navigate to a persons profile Click the Actions Tab under their profile picture Find & Click ‘Send Group Leader Agreement’. Fill out the custom message […]
Read MorePlanning Catering | 220
Ordering catered food can be tough, especially when you’re planning for a large group. You want to select a variety, and you also want to be sure that you have enough sides and entrees for everyone present. At the same time, you don’t want to buy so much that there’s a large amount of excess. […]
Read MoreEvent Planning Checklists | 219
Have you worked on planning an event and thought… it would be nice to develop a checklist? SAME! None of us want to forget anything, but there are so many little details to remember. Centrally, we have created an operations task list template to help us close some of those gaps when planning an event. […]
Read MoreEvent Planning Timelines | 218
As the new ministry year kicks off, we know many of your are starting to plan little and big events. Maybe you are planning a worship night, a prayer night, a team dinner or maybe your kickoff leader meeting. Each of these events requires some time, thought and energy behind them. We thought it might […]
Read MoreBackground Check Process | 217
Background Checks are good for 1 year. At CedarCreek Church we run renewals each year. There are a few nuances to be aware of so we thought we would type up this ProTip to work through the details with each of you! Here is the process as we have previously put together. Lets first discuss who […]
Read MoreMobile Device Security | 214
Most of us have a smartphone, but how many of us really think about the security threats faced by these mobile devices? Mobile devices are vulnerable to many different types of threats. The bad guys are increasing attacks on mobile devices and targeting your phone using malicious applications. Using these methods, they can steal personal […]
Read MoreSocial Media Hijacking | 213
More than half of the world’s population uses at least one social media platform. Users can post to Facebook, Instagram, and Snapchat for all their followers to see. When a friend, family member, or influencer posts to social media, do you ever question whether they actually created the post? Would you trust them if they […]
Read MoreBulk Edit Connections | 212
Did you know that you can bulk update connections. An example of this might be… you want to take 5-10 connections and give them all the same activity. You might have been calling a list of connections and want to close them all out at once. You can do that with bulk updates! If you […]
Read MoreMicrosoft Teams Conference Room | 211
Did you know that both Findlay Campus and Central Support each have their conference set up with Microsoft Teams. Below are some instructions on how to use these systems. If you want to invite these rooms to a meeting before the meeting begins, you can use these email addresses: Central Support: RoomCentralSupportConference@cedarcreek.tv Findlay: RoomFindlayConference@cedarcreek.tv Invite […]
Read More