Windows IT Pro Guest Blogs

Apr 6, 2015

3 Ways to install Hyper-V: Which is best? 2

Hyper-V is one of those technologies that can exist a number of different ways. In fact, I have had many discussions with people about which way to have Hyper-V installed. The most interesting part is that we get some different answers as to which is the best way to install Hyper-V....More
Mar 6, 2015

Office 365 Subscribers: Keep those deleted items! An MVP’s Take

On February 20th the Office 365 team introduced a change to the email retention period for deleted items in Exchange Online. Now, the retention period for the Deleted Items folder has been extended indefinitely. I’m sure the Office 365 support teams come across irate customers on a daily basis that simply do not understand about the intended purpose of the Deleted Items folder and retention polices. What does this change mean?...More
Mar 2, 2015

Mastering patch management: 5 tips that will work for you

There’s no debating IT pros are stretched thin. Likewise, there’s no debating that patch management, while a mundane job, is a business priority. ControlNow Security Lead Ian Trump offers five easy tips to help IT pros better handle this priority....More
Jan 26, 2015

Why the 3-2-1 backup rule STILL makes sense 2

In the IT world, some rules are always changing.  It’s good to remember, however, that some rules are timeless because they still make A LOT of sense! The 3-2-1 backup rule is a great example. The 3-2-1 backup rule can help you overcome nearly any failure scenario if you follow it. The 3-2-1 backup rule implies that you should:...More
Jan 26, 2015

Multi-factor authentication serves and protects

User authentication plays a central role in password resetting. Passwords are still the most popular user authentication method even though they are proven to be notoriously weak due to the fact that they are managed by people – the weakest link in the security chain. Its human nature to choose weak passwords that can be remembered easily, however such passwords can also be easily hacked.  ...More
Jan 22, 2015

Would Einstein say your method for IT management is insane?

Are you familiar with Albert Einstein’s definition of insanity? One can make the case it applies to IT pros that haven’t embraced centralized IT management – a game-changer that can transform your business.  But first, a quick refresher: Einstein said insanity is “doing the same thing over and over again, and expecting different results.” ...More
Dec 18, 2014

Top 2014 cyberattacks attacks and how to avoid them in 2015

2014 saw a host of cyberattacks and their difficult-to-manage consequences. Let us take a look at those infamous incidents and learn what we can do to mitigate the risks in the coming year....More
Dec 15, 2014

Eight Email Faux Pas That Need to Die

Sponsored Blog When email is something we use every day, it’s easy to miss some of the silly things we do that prevent us from using it as effectively as possible, but it doesn’t have to be that way. Skipping the basics like forgotten attachments, this list covers email usage crimes you might not even know you’re committing. Attaching the wrong thing...More
Dec 15, 2014

No laughing matter: Why your company’s IT security isn’t a joke

Sponsored Blog Have you taken a few minutes to read about the recent North Korean hack of Sony Pictures? Once you’ve been sufficiently amused by the leaked digital dust-ups that involved top Tinseltown executives, there’s really only one conclusion you can draw.  It’s not funny at all.  Sure, the name-calling and posturing was mildly entertaining. But the hack is no laughing matter: Today’s threat landscape is Hollywood horror film scary. ...More
Nov 25, 2014

Strength in numbers: Why layered network protection is priority

Cybercriminals are relentless in their efforts to cash in by compromising your network. It’s a reality that’s unlikely to change for the better. That’s why your approach to security needs to change, Marc Thaler writes....More
Nov 24, 2014

When Will My Passwords Go Away?

Despite emerging technologies, username and password pairs are here to stay. Keeping passwords secure, providing end-user self-service, and leveraging passwords for complex enterprise scenarios are things that take valuable time and thought....More
Nov 17, 2014

Why you need a data breach response plan and how to make one

Sponsored Blog I probably don’t need to tell you how important it is to prepare for data breaches. Headlines about breaches that affected Target and The Home Depot should be enough to scare you, but let’s look at some facts anyway:...More
Oct 28, 2014

Self-Service: A People Problem 2

Companies regularly fail at implementing IT self-service solutions and miss out on real values such as availability, service levels, user experience, and financial benefits....More
secure passwords
Oct 15, 2014

Password Management Doesn't Have to Be Painful 4

Sensitive information is leaked enough as it is, and a secure password is at least one line of defense....More
unified communications
Oct 14, 2014

Top 3 Lync Issues: How to monitor and troubleshoot them

Although Microsoft has delivered numerous improvements throughout the years, it is still very challenging for administrators to ensure a good quality of service for Lync, especially for audio/video calls....More
Oct 7, 2014

Taking Control of Active Directory Changes – Part I

Active Directory is big, complex and difficult to figure out in some cases. Microsoft does not enable auditing automatically for the changes that occur on your domain controllers to the Active Directory database....More
Sep 22, 2014

Passphrases: Better Security, Better Usability

Longer passwords are harder to crack and easier to remember. They increase security while improving end-user productivity and satisfaction....More
Aug 21, 2014

The Three Best Outlook Tips for Power Users

The cleaner employees can keep their Outlook folders, the fewer burdens are placed on the Exchange server. Here’s what users can do to make their Outlook experience a tad bit easier....More
Jul 14, 2014

Your Biggest Security Threats are Convenience and Ignorance

Data breaches are problems that don't just affect the largest firms out there. A quick look at our recent infographic The Crippling Cost of Data Loss reveals some surprising facts about data breaches....More
Jun 16, 2014

Determining Total Cost of Ownership for Your Network Items

When it comes to software and hardware, businesses don’t always think about the total cost of ownership (TCO). In the IT world, many hidden costs are tough to peg down....More
What's Windows IT Pro Guest Blogs?

Timely insights from our Platinum Sponsors

Blog Archive

Sponsored Introduction Continue on to (or wait seconds) ×