Latest Blog:

Types of Social Engineering

CPI - Social Engineering Attacks

This is to serve as an overview of the steps required to perform updates to an Exchange 2010 server that is a DAG member of a two node cluster. If you are looking for a process...

What if applications and desktops could follow people everywhere, to all their devices, seamlessly and securely? With Citrix they do. Trusted by 98% of Fortune 500 companies, Citrix continues to set the standard for delivering...

Today’s business world has gotten extremely competitive with the advancement of technology. People, businesses and organizations are no longer afraid of the Internet. Successful businesses rely on it to remain agile and quickly gain information...

The offline address book can be a beast to troubleshoot. I have found success many times by following a procedure that I have pieced together. My hope is that it proves helpful to others that run into similar...

With the way things are going there may be very few on premise mailboxes left in a few years. I was recently asked to help setup Exchange federation of free/ busy calendar information between an...

Updating Exchange 2013 can be a messy experience if not done correctly. You can end up with a data loss or server down issue. I have created this procedure that I and my team use...

Recovery Database – Exchange 2013 I had a situation in which my client had lost an Exchange Server and it wasn’t recoverable. They also lost a Database in the mix up and we had to recover...

The business world is in the midst of another rapid technological change and ferocious competition. Companies are managing their capital and operating budgets with a keen eye on operations and the future. Department budgets are...

Are you considering outsourcing IT to a managed service provider? If not, do you know about the benefits of doing so? Many organizations are turning to Managed Service Providers (MSPs) to help alleviate some of the...