General | December 7, 2023Top tips: 4 hacks you should try now to keep your text messages secure Top tips is a weekly column where we highlight what’s trending in the tech world today and...
Network Configuration Manager | March 31, 2023Redundancy for IT resilience: The backup guide for a disaster-proof network Around six years ago on a Wednesday morning, software professionals worldwide were...
General | March 28, 2023World Backup Day: Tips for a successful small business backup strategy In today's digital economy, businesses have access to more data than ever. As newer...
Identity and access management | December 14, 2017GDPR preparation—Testing GDPR compliance auditing will be new to many organizations that have never been under a...
Identity and access management | November 16, 2017Common mistakes administrators make when applying GPOs – Part 3 Although it's not directly related to the application of Group Policy Objects (GPOs),...
Identity and access management | August 31, 2017Ransomware basics: Part 2 In our first installment, we discussed the importance of backing up your data. Without a...
Identity and access management | August 24, 2017Ransomware basics: Part 1 There are many articles on ransomware. Many are trying to convince you that if you buy the...
RecoveryManager Plus | July 31, 20175 things to keep in mind before backing up your VMware virtual machines The architecture of a virtual machine differs vastly from traditional on-premises...
Identity and access management | December 31, 2015Good-bye 2015: Final week of year tasks for Active Directory As administrators, we are the employees that rarely get to take time off work, as someone...
RecoveryManager Plus | December 2, 2014AD Admins: Are you prepared for the worst? One of Aesop's greatest fables, titled 'The Ant and the Grasshopper', teaches us a...