Windows IT Pro Guest Blogs

Sep 22, 2014

Passphrases: Better Security, Better Usability

Longer passwords are harder to crack and easier to remember. They increase security while improving end-user productivity and satisfaction....More
Aug 21, 2014

The Three Best Outlook Tips for Power Users

The cleaner employees can keep their Outlook folders, the fewer burdens are placed on the Exchange server. Here’s what users can do to make their Outlook experience a tad bit easier....More
Jul 14, 2014

Your Biggest Security Threats are Convenience and Ignorance

Data breaches are problems that don't just affect the largest firms out there. A quick look at our recent infographic The Crippling Cost of Data Loss reveals some surprising facts about data breaches....More
Jun 16, 2014

Determining Total Cost of Ownership for Your Network Items

When it comes to software and hardware, businesses don’t always think about the total cost of ownership (TCO). In the IT world, many hidden costs are tough to peg down....More
May 29, 2014

Reduce the Risk of CryptoLocker Without Using Antivirus 1

If you don’t have a plan that addresses situations where cyber threats sneak past your security (or are downloaded accidentally by employees), it’s time to think about getting one....More
Apr 23, 2014

Six Online Tools You Didn’t Know You Needed

The trouble with the internet is that now there are dozens and dozens of tools that can help you out in both business and at home that you might not even know about. With that in mind, here are a few tools we’ve recently discovered and found to be very useful, in no particular order....More
Apr 4, 2014

Disaster Communication for Small Business

Post-disaster communication is important to not only ensuring the safety of employees, but to managing their expectations with regard to work. Be sure you and your clients know what the communication protocol is for various emergencies....More
Apr 2, 2014

The Ideal Monitoring Strategy for Applications Powered by SQL Server

Ensuring optimal performance of applications powered by SQL Server is on top of every DBA’s agenda. Given the complex and dynamic nature of today’s business applications, it is imperative that administrators put together a proactive monitoring strategy to avoid DBA stress and burnout....More
Feb 12, 2014

5 Ways Not to Plan for Data Disaster

For a lot of organizations, backup and disaster recovery gets pushed to the curb in favor of a variety of day-to-day IT problems, upgrades, and maintenance concerns. Sure, it’s easy to think of backup and recovery as something secondary to regular operations. You may feel like you’re preparing for something that may not happen and therefore don’t see the importance, or you might see the importance but run into trouble getting the budget to implement the plan your company needs....More
Jan 22, 2014

BYOD 2.0: The next phase of Mobile Devices and their impact on enterprises in 2014

The rate at which technologies are evolving is so rapid that the current technology is becoming ‘a thing of the past’ within a few months of its introduction in the market. Such a quick trend shift happens a lot, especially in the area of mobile devices. Yet technology advancements continue to drive economic growth in changing the way we work and live....More
Jan 7, 2014

A Look at Server Recovery Time Objectives

This article looks at server recovery, which is useful information for determining a business’s recovery time objective (RTO). RTOs are a useful business metric and an early step towards creating a fully-fleshed disaster recovery plan....More
Nov 22, 2011

2012 State of Endpoint Report Is In – Embrace Change to Win on Security

It seems like only yesterday when I was excited to share the results from our 2010 report on the state of the endpoint. This week, we are releasing data from our third annual State of the Endpoint study conducted by the Ponemon Institute and I have to admit, this year’s data is even more intriguing, albeit discouraging....More
What's Windows IT Pro Guest Blogs?

Timely insights from our Platinum Sponsors

Blog Archive

Sponsored Introduction Continue on to (or wait seconds) ×