H/T: Susan L. Colantuono, Leading Women There are many traits that constitute and effective leader. While all of these traits are important in leaders of all genders, women seem to…
Recently I was working on a network outage that only 2-3 ip addresses of a single network out of 15-20 different network segments was getting randomly blocked, then would be…
As an IT consultant I hear from many customers that they are struggling with staying on top of their projects, while simultaneously planning for the future. Many IT teams are…
According to The Business News Daily, Contract Management is the process of managing contract creation, execution and analysis to maximize operational and financial performance at an organization, all while reducing…
Recently we were running into an issue where a client couldn’t enable archiving in Exchange 2010. When we attempted to enable for said user we got the following error. “Mailbox…
What does compliance mean in the context of email? And why should the IT team care? Compliance means storing email (and data) as long as the law (or corporate policy)…
Many anti-spam programs block a lot of spam, but they also mistakenly block a lot of legitimate email and send it to your spam box. Good emails blocked as spam are…
In the last 3-4 years there has been a lot of talk about encryption. Today we will discuss whether to trust a websites certificate or not. First let’s discuss what…
In today’s On Demand environment, no one has time for slow Wi-Fi, nor the dreaded dead zone. But what can I do without having to spend a nickel. One of…
Dear IT Professionals and Business Decision Makers, Cisco has published a CRITICAL vulnerability on their Cisco ASA firewalls. This vulnerability is on any ASA with a VPN setup on it. …