Latest posts

Page 61

January Webinar Outlines MSP Marketing Strategy for 2012

Want to get 2012 off to a rousing start and be well informed on the top areas where you should be focusing your marketing strategy this year? We’ve got you covered this January with our FREE webinar. Webinar:  The Top 5 Must Focus Areas of Your MSP Marketing Strategy in 2012 Thursday, January 26, 2012 […]

Continue reading

9 Fundamental Tips for Event Log Management

Are you logging? Do your servers, firewalls, routers, IPS systems, and applications write log files? Good. What are you logging? What do you do with those log files? Do you review them every day? Do you correlate them? Do you investigate errors or strange access patterns? Do you archive them? Or do you just let […]

Continue reading

Introducing – GFI Labs

GFI Labs Blog, the research and information security news hub of GFI Software, is now part of the GFI domain. Formerly known as the Sunbelt Labs Blog, it is one of the industry’s go-to portals for security enthusiasts and IT users looking for the latest news on online threats, social engineering ploys, and noteworthy scams. […]

Continue reading

5 Reasons to Use Fax Server Software

Why would you need to buy fax server software when you have a fax machine that works just fine? That 90’s relic that looks so old-fashioned and quaint. Have you ever realized that the old manual fax machine on the desk is costing you money, exposing confidential information to unauthorized parties and a legal risk? […]

Continue reading

5 Tips for Server Patch Management

Got servers? Then you need to perform server patch management. Not annually, not once a quarter, not when you feel like getting around to it. Microsoft releases patches on a monthly basis to make it easier for IT professionals to plan their server patch management activities on a predictable cycle, but those out of band […]

Continue reading

Survey: 69% of SMBs Claim Deleted Email Retrieval Lowers IT Staff Productivity [INFOGRAPHIC]

Email is not only business-critical, but it is one huge repository of unstructured data that contains key knowledge, workflow information and customer contact data. All this data can offer significant value to an organization even after it is placed into an archive or most likely left in a PST file on a user’s machine. The […]

Continue reading

How to Set Up an Internet Usage Policy

Some 40% of the time spent on the Internet at work has nothing to do with work, according to research. Controlling access to the Internet at work is really important, but how do you go about it? This quick video provides valuable advice on how companies can protect themselves and their overall productivity with a […]

Continue reading

Troubleshooting Information Overload

Let’s face it; most of us in IT spend entirely too much time in firefighting mode. We talk a great game about being proactive, and keeping ahead of issues; monitoring our systems for utilization and capacity so we can schedule upgrades before things bog down. But then, with our phones beeping almost non-stop, having to […]

Continue reading

How IT Can Rise Above the Mobility Wave

We don’t need studies and surveys to confirm what is evident in a growing number of business environments today: more and more employees are using their personal smartphones for work; the line between personal and office use is becoming ever so blurred. The era of the ‘mobile employee’ is here whether people accept it or […]

Continue reading

Why Organizations Are Moving Email to Fax (Part 2)

In addition to the inbound communication that was covered in Part 1 of this two-part blog post, it is important to consider the need to send outbound communication through email to fax functionality.    In a similar fashion to the ability to receive faxes as email, users can send faxes directly from their standard email client […]

Continue reading