Windows IT Pro Guest Blogs

Dec 18, 2014
Sponsored

Top 2014 cyberattacks attacks and how to avoid them in 2015

2014 saw a host of cyberattacks and their difficult-to-manage consequences. Let us take a look at those infamous incidents and learn what we can do to mitigate the risks in the coming year....More
Dec 15, 2014
Sponsored

Eight Email Faux Pas That Need to Die

Sponsored Blog When email is something we use every day, it’s easy to miss some of the silly things we do that prevent us from using it as effectively as possible, but it doesn’t have to be that way. Skipping the basics like forgotten attachments, this list covers email usage crimes you might not even know you’re committing. Attaching the wrong thing...More
Dec 15, 2014
Sponsored

No laughing matter: Why your company’s IT security isn’t a joke

Sponsored Blog Have you taken a few minutes to read about the recent North Korean hack of Sony Pictures? Once you’ve been sufficiently amused by the leaked digital dust-ups that involved top Tinseltown executives, there’s really only one conclusion you can draw.  It’s not funny at all.  Sure, the name-calling and posturing was mildly entertaining. But the hack is no laughing matter: Today’s threat landscape is Hollywood horror film scary. ...More
Nov 25, 2014
Sponsored

Strength in numbers: Why layered network protection is priority

Cybercriminals are relentless in their efforts to cash in by compromising your network. It’s a reality that’s unlikely to change for the better. That’s why your approach to security needs to change, Marc Thaler writes....More
Nov 24, 2014
Sponsored

When Will My Passwords Go Away?

Despite emerging technologies, username and password pairs are here to stay. Keeping passwords secure, providing end-user self-service, and leveraging passwords for complex enterprise scenarios are things that take valuable time and thought....More
Nov 17, 2014
Sponsored

Why you need a data breach response plan and how to make one

Sponsored Blog I probably don’t need to tell you how important it is to prepare for data breaches. Headlines about breaches that affected Target and The Home Depot should be enough to scare you, but let’s look at some facts anyway:...More
Oct 28, 2014
Sponsored

Self-Service: A People Problem 2

Companies regularly fail at implementing IT self-service solutions and miss out on real values such as availability, service levels, user experience, and financial benefits....More
secure passwords
Oct 15, 2014
Sponsored

Password Management Doesn't Have to Be Painful 4

Sensitive information is leaked enough as it is, and a secure password is at least one line of defense....More
unified communications
Oct 14, 2014
Sponsored

Top 3 Lync Issues: How to monitor and troubleshoot them

Although Microsoft has delivered numerous improvements throughout the years, it is still very challenging for administrators to ensure a good quality of service for Lync, especially for audio/video calls....More
Oct 7, 2014
Sponsored

Taking Control of Active Directory Changes – Part I

Active Directory is big, complex and difficult to figure out in some cases. Microsoft does not enable auditing automatically for the changes that occur on your domain controllers to the Active Directory database....More
Sep 22, 2014
Sponsored

Passphrases: Better Security, Better Usability

Longer passwords are harder to crack and easier to remember. They increase security while improving end-user productivity and satisfaction....More
email_Outlook
Aug 21, 2014
Sponsored

The Three Best Outlook Tips for Power Users

The cleaner employees can keep their Outlook folders, the fewer burdens are placed on the Exchange server. Here’s what users can do to make their Outlook experience a tad bit easier....More
Jul 14, 2014
Sponsored

Your Biggest Security Threats are Convenience and Ignorance

Data breaches are problems that don't just affect the largest firms out there. A quick look at our recent infographic The Crippling Cost of Data Loss reveals some surprising facts about data breaches....More
Jun 16, 2014
Sponsored

Determining Total Cost of Ownership for Your Network Items

When it comes to software and hardware, businesses don’t always think about the total cost of ownership (TCO). In the IT world, many hidden costs are tough to peg down....More
May 29, 2014
Sponsored

Reduce the Risk of CryptoLocker Without Using Antivirus 1

If you don’t have a plan that addresses situations where cyber threats sneak past your security (or are downloaded accidentally by employees), it’s time to think about getting one....More
tools
Apr 23, 2014
Sponsored

Six Online Tools You Didn’t Know You Needed

The trouble with the internet is that now there are dozens and dozens of tools that can help you out in both business and at home that you might not even know about. With that in mind, here are a few tools we’ve recently discovered and found to be very useful, in no particular order....More
Apr 4, 2014
Sponsored

Disaster Communication for Small Business

Post-disaster communication is important to not only ensuring the safety of employees, but to managing their expectations with regard to work. Be sure you and your clients know what the communication protocol is for various emergencies....More
Apr 2, 2014
Sponsored

The Ideal Monitoring Strategy for Applications Powered by SQL Server

Ensuring optimal performance of applications powered by SQL Server is on top of every DBA’s agenda. Given the complex and dynamic nature of today’s business applications, it is imperative that administrators put together a proactive monitoring strategy to avoid DBA stress and burnout....More
Feb 12, 2014
Sponsored

5 Ways Not to Plan for Data Disaster

For a lot of organizations, backup and disaster recovery gets pushed to the curb in favor of a variety of day-to-day IT problems, upgrades, and maintenance concerns. Sure, it’s easy to think of backup and recovery as something secondary to regular operations. You may feel like you’re preparing for something that may not happen and therefore don’t see the importance, or you might see the importance but run into trouble getting the budget to implement the plan your company needs....More
Jan 22, 2014
Sponsored

BYOD 2.0: The next phase of Mobile Devices and their impact on enterprises in 2014

The rate at which technologies are evolving is so rapid that the current technology is becoming ‘a thing of the past’ within a few months of its introduction in the market. Such a quick trend shift happens a lot, especially in the area of mobile devices. Yet technology advancements continue to drive economic growth in changing the way we work and live....More
What's Windows IT Pro Guest Blogs?

Timely insights from our Platinum Sponsors

Blog Archive

Sponsored Introduction Continue on to (or wait seconds) ×