29 Aug

Top 3 Takeaways From ILTACON 2018

While ILTACON 2018 was a veritable hotbed of ideas, the buzz undoubtedly coalesced around a few trends that emerged as the main themes of this year’s conference. The lessons of the sessions, questions posed by attendees, and results of our polling all pointed to the same thoughts on the collective mind of the legal IT Read more…

17 Oct

KRACK: A serious Wi-Fi vulnerability

Yesterday security researchers announced a serious security flaw that affects virtually every wireless device in the world. KRACK (short for “Key Reinstallation Attack) exploits a vulnerability in WPA2, a security protocol that most modern Wi-Fi devices rely on, including computers, phones, and routers. Rather than exploit access points, a common attack strategy, hackers can use KRACK Read more…

29 Sep

October 31 Deadline for Legacy Microsoft Office Connecting to Exchange Online

A while back Microsoft announced a change that would deprecate RPC over http from Exchange Online in favor of the more modern MAPI over http. It’s officially happening October 31, and as we get closer to the deadline we want to remind clients that this will affect anyone connecting to Exchange Online with legacy Office Read more…

30 May

For the New IT Administrator: Three Key Steps to a Successful IT Transition

When a new IT administrator starts at a firm, the first look at the network is often overwhelming. As a managed services provider, we have encountered this experience countless times. Here are some basic steps that we have found useful when supporting a new client. Document everything. Documentation is often overlooked in favor of technical concerns, but a Read more…

15 May

Defend Yourself Against the Next WannaCry With Vulnerability Scanning and Patch Management

A widespread ransomware campaign is affecting a large number of organizations across the globe. Currently, tens of thousands of infections have been reported in as many as 74 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan. The malicious software can run on 27 languages, allowing it to spread widely. If you are Read more…

10 May

Manage Legal IT: The Next Strategic Advantage

By John Kogan and Lucas Messina. This article originally appeared on LegalITProfessionals.com.  Modern businesses are hives of activity with many teams carrying out myriad functions to help the organization thrive.  Underpinning this collaborative work in the modern office is technology. Technology Managed Services is the practice of outsourcing the day-to-day management of workstations and laptops, Read more…

22 Feb

Take Your RPO Down to Seconds With Zerto

Having a copy of your data offsite has always been imperative in any Disaster Recovery (DR) plan.  Back in the time before time, that was done by sending backup tapes offsite. Among our smaller clients, this was typically done once a week by a member of the firm. Our larger clients would send tapes offsite Read more…

07 Nov

Citrix Provisioning Services and DST

It’s that time of year again. The weather gets colder, the days get shorter, and IT engineers forget to update their Citrix Provisioning Services (PvS) images to account for Daylight Savings Time. If any issues are reported where Group Policy is not applying correctly to VMs provisioned via PvS, the image simply needs to be updated Read more…

27 Jul

Microsoft KB breaks WSUS (SCCM Software Update Point)

Back in May, Microsoft released KB3159706 to resolve an issue with a previous KB that broke WSUS.  Unfortunately, KB3159706 also breaks WSUS. You can prevent this by performing some manual steps after it is installed. We have repeatedly seen WSUS service crashes labeled Event 7031 with the error “The WSUS Service service terminated unexpectedly.  It has Read more…

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5