We recently had a client take on a new hire, although I was confident in their ability in managing Active Directory I wanted to take an extra step in protecting…
Today we’re going to talk a little on UM greetings, speciffially exporting and importing. Now this will be focused in and around the Microsoft realm however some of these procedures…
Last month I wrote about Risk Management related to Information Technology. One of the primary steps in the risk management process is to conduct a risk assessment. A Risk Assessment…
Have you recently migrated to O365 and are getting reports from your users about winmail.dat attachments? Well you’re not the only one. This is somewhat common and typically caused by…
“We couldn’t join you to the meeting because the security certificate isn’t trusted.” “‘Runtime Error in ‘/meet’ Application.” Recently we encountered a Lync meeting problem I have not seen…
Cisco has multiple wireless LAN controllers (WLC), they seem to be pushing their combined 3850 switch and WLC. The controller portion of the 3850 switch is the Cisco 4404 WLC….
Standing Lowers Your Risk of Weight Gain Standing for a few hours out of the day has been shown to burn 170 more calories than if you’d spent that time…
The best friend of every backup vendor is back on the blog – cryptolocker / teslacrytp /etc. I am writing this as a posthumous analysis of a yet another ransomware…
As you may already know – as of July 1st of 2016, Microsoft no longer is providing Office 365 E4 licenses to organizations. This was the ideal subscription for organizations…