Working in IT administration is a stressful endeavor. Granted, there’s no comparison with brain surgery or air traffic control; but it is a field that few people understand from the outside looking in. Non-technical people don’t really get what an IT guy does every day, so they can’t understand the level of stress they bear. Continue reading →
Email is a double-edged sword. You cannot work without it, yet the daily, incessant flow of emails drives you up the wall. Well, if you can’t beat email, there’s still a lot you can do to make your email work for you. Here are a few tips to implement both on the client and server side of your email infrastructure.
Here’s six ways you can make email work for you using things you already have built-in.
Michael Belisle, IT manager at Fisher & Sons, in Burlington, WA, explains how GFI Cloud helps ease the load of IT management and make his life easier as a one-man IT team. He is interviewed by Jackie Wake.
Tell us about your set up and the main challenges you had to address?
Our IT footprint consists of over 100+ seats, 18 virtual servers, 5 major offices, and users spread out over 4 states in the USA. A total of 80% of my end user base are remote users. In my environment, it is important for me to find tools that allow me to do more with minimal time and money invested.
How many email messages do you send each day? How many do you receive? Like many regular users, you probably send over 30 messages per day and receive over 100. If you are a power user, you can probably double those numbers and still come up short. With so much mail flowing through your inbox, it is far too easy to find your inbox full, to suffer from information overload, or even to get a little delete-happy and drop messages that you may need later on. Whether you are limited by the size of your mailbox, or the storage on your solid-state drive, there is a very good chance at some point you or your employees are going to find the need for an email message that was deleted. Continue reading →
Email is by far the number one way networks are compromised and the main route for data leakage. Fortunately there are some simple ways to safeguard this vital asset and the resources your email connects to.
1. Proper passwords
Too many email accounts are protected by passwords weaker than a Tour de France racer’s bicep. Simple passwords are simple to remember – so left to their own devices, that is what end users tend to choose. Continue reading →
Turn back the clock to late last year. At the height of the holiday season, between November 27 and December 15, hackers certainly gave new meaning to the term “hit the bull’s-eye!”
Cybercriminals toyed with retail giant Target, known for the circular red and white logo that symbolizes its name. Information from 40 million guest debit and credit card accounts was stolen – or so it was thought. The initial estimate, already among the largest in U.S. corporate history, turned out to be a fraction of the total. Today, it ranges from 70 million to 110 million, depending on reports. Continue reading →
When you started out in IT, did you really want to spend all your life applying patches to PCs and checking if the antivirus product installed is up to date and working properly? Let’s be honest, these tasks get a little repetitive and monotonous, but if you drop the ball with either of these jobs, your IT department (and you) could end up in hot water. Taking shortcuts on patching and antivirus should never be an option. Continue reading →
Mobile devices have become an integral part of life and business. More than 58 percent of Americans own a smartphone and 42 percent own a tablet, reports Pew Research. Learn how to use your smartphone and tablet to run your business while out of the office. Become more mobile, get in font of your customers, and be productive with these mobile devices technologies. Continue reading →
This article lists 10 of the best free tools for managing, comparing, administering and developing databases. Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two on this list. Continue reading →
This article explains the two different versions of GFI EventsManager, and how it is licensed. Unfortunately GFI doesn’t break them down on its website, and thus creates some confusion to potential customers.
Formerly GFI EventsManager for Servers, GFI recently added an active monitoring component to the software. This is similar to GFI Network Monitor and adds the ability to monitor services, CPU utilization, hard drive space and more. This version also allows to you to manage event logs from Windows Servers, W3C logs and Sys logs from network devices such as Cisco routers and switchers. You are not able to manage logs from computers running Microsoft Windows (workstations) this product is licensed per node. Continue reading →