Latest posts

Page 60

5 Reasons to Use Fax Server Software

Why would you need to buy fax server software when you have a fax machine that works just fine? That 90’s relic that looks so old-fashioned and quaint. Have you ever realized that the old manual fax machine on the desk is costing you money, exposing confidential information to unauthorized parties and a legal risk? […]

Continue reading

5 Tips for Server Patch Management

Got servers? Then you need to perform server patch management. Not annually, not once a quarter, not when you feel like getting around to it. Microsoft releases patches on a monthly basis to make it easier for IT professionals to plan their server patch management activities on a predictable cycle, but those out of band […]

Continue reading

Survey: 69% of SMBs Claim Deleted Email Retrieval Lowers IT Staff Productivity [INFOGRAPHIC]

Email is not only business-critical, but it is one huge repository of unstructured data that contains key knowledge, workflow information and customer contact data. All this data can offer significant value to an organization even after it is placed into an archive or most likely left in a PST file on a user’s machine. The […]

Continue reading

How to Set Up an Internet Usage Policy

Some 40% of the time spent on the Internet at work has nothing to do with work, according to research. Controlling access to the Internet at work is really important, but how do you go about it? This quick video provides valuable advice on how companies can protect themselves and their overall productivity with a […]

Continue reading

Troubleshooting Information Overload

Let’s face it; most of us in IT spend entirely too much time in firefighting mode. We talk a great game about being proactive, and keeping ahead of issues; monitoring our systems for utilization and capacity so we can schedule upgrades before things bog down. But then, with our phones beeping almost non-stop, having to […]

Continue reading

How IT Can Rise Above the Mobility Wave

We don’t need studies and surveys to confirm what is evident in a growing number of business environments today: more and more employees are using their personal smartphones for work; the line between personal and office use is becoming ever so blurred. The era of the ‘mobile employee’ is here whether people accept it or […]

Continue reading

Why Organizations Are Moving Email to Fax (Part 2)

In addition to the inbound communication that was covered in Part 1 of this two-part blog post, it is important to consider the need to send outbound communication through email to fax functionality.    In a similar fashion to the ability to receive faxes as email, users can send faxes directly from their standard email client […]

Continue reading

51 Items on an Admin’s Wish List for 2012

With the New Year at the corner, it is time to start putting together our admin’s wish list for 2012. Anything goes for this list – new hardware or software for work, changes to procedures or offerings from vendors, geeky gadgets, and future tech. Here’s the list I have compiled: 

Continue reading

4 Web Security Threats to Look Out For

Is your network sufficiently protected from web security threats? Have you been lulled into a false sense of security? Hackers are changing their habits and using new methods which are web-based, dynamic in their nature and hidden in otherwise legitimate sites. The end-user remains the weakest link in web security as malware authors exploit this […]

Continue reading

4 Steps to Recovering a Failed Exchange Server

No sane administrator wants to be at the receiving end of a failed Exchange Server, given the enormous pressures that the rush to restore services entails.  Yet the very real possibility of data loss coupled with general inexperience with server restoration – it’s not something that happens all the time, after all – makes it […]

Continue reading