The world has quickly changed over the past few weeks, but the one thing that hasn’t is the inclination of shady characters to exploit individuals and organizations with a variety of coronavirus scams. As well as what to look out for, we highlight some IT best practices to help you … Read More
12 Dos and Dont’s at Christmas for trouble-free IT.
It’s the holiday season—many of us have already given thanks, and some of us are now celebrating with friends and families. Some of us fortunate enough might be busy donating money and/or volunteering our time to help those less fortunate. As always, we need to remain vigilant for individuals who … Read More
Malware Evolution or in Other Words “All Your Data Are Belong to Us.”
It’s a twist on a popular internet meme based on a phrase from the classic arcade game, Zero Wing. Only, in this case, it’s not a game. It’s your data – your files and documents. It’s your pictures and your videos. It’s your finances. It’s your life. It’s worth more … Read More
Security Risks Affecting Your Network and How to Deal with Them.
Infiltrating the security of your core business network could be devastating for any sized business, particularly small businesses. Ransomware freezes the system, holding it hostage for a fix. Viruses corrupt data and destroy entire databases throughout a computer network. Spyware steals company secrets or uses personal data. Any one breach … Read More
Is Cyber Insurance a Necessity or a Luxury?
Many of us view insurance as a necessary evil. We loathe paying the premiums, but we all deal with it at some point—whether it’s health insurance, car insurance, homeowners/renter’s insurance or some other type of insurance. Add one more type of insurance to the list, now there is cyber insurance … Read More
Regional Settings for Shared Mailboxes in Office 365 / Exchange Online
I recently jumped in to assist a client experiencing multiple problems that occurred during a migration to Office 365. As I was working to correct and complete the implementation of their new environment, I noticed an issue with regional settings – the time was off by a few hours when … Read More
IT Asset Management – 3 Vital Keys to Getting It Right.
Whether you’re a small business, a large enterprise, or anything in between, having at least a basic IT Asset Management (ITAM) process can help streamline the process of planning, deploying and supporting your IT infrastructure. In this article, we will discuss each of the three major components you should focus … Read More
DNS Scavenging In Active Directory – Settings and Configuration
In nearly every environment I’ve walked into, especially those that are more mature (read: older), DNS contains a plethora of stale entries, whether statically configured and forgotten about or dynamically registered, but never deleted or scavenged. Most of those environments could benefit from implementing Active Directory DNS Scavenging. For some … Read More