Managed Service Providers are now a favorite target of hackers and their ransomware attacks. Everyone should now be woke and perform an internal security audit.
We have to gather up resumes from our online ads, filter them, and then save them somewhere that the hiring committee can take a look at all of them, discuss and decide who they want to interview and schedule those interviews. Let’s automate!
We now have a really nice feature-rich solution for receiving files, keeping data safe, and automating the cleanup task. It’s been a long time coming.
This is the first in a series of articles on how to perform Microsoft 365 administration with tips on configuration, policies, and settings. This is member-only content. Become a member! This one is free, subsequent articles in this series require a small supporting fee. There is a new article published […]
How you manage technology for your clients is up to you. The important part is that you do “M” (manage) and “SP” (be a services provider).
The ability to encrypt email is a critical feature. So much information gets sent via email — corporate secrets like specifications, private content like pretty much anything from your accountant or lawyer, or maybe just something you’d like to keep between you and the recipient. Email encryption is a fact […]
Being able to add new pages to your SharePoint site is a basic task that any admin should know how to do. Microsoft has moved things around recently which makes creating a new page in SharePoint something of a challenge if you haven’t done it recently or if you’re new […]
As a result of finding that eDiscovery results were not complete I needed to re-index the mailbox database on an Exchange 2010 server. I found that while the information is out there, it’s not so easy to find. You may also need to re-index if your index files get too […]
Recently a hotfix for Windows 7 that needs to go out to every Windows 7 computer has had many people scratching their heads at the annoyance of having to touch so many computers. A HotFix is something you click on a link and download to an individual machine one by […]
The most difficult thing about troubleshooting a system is that such much of the skill is dependent on experience. When a symptom looks like something you’ve seen before but isn’t you can quickly find yourself going down a very dark tunnel. Such can be the case with a corrupt TCPIP […]