Latest Blog:

Cloud Security Strategy: 5 Necessary Policies

CPI -Cloud Security Strategy
5 must know policies in order to improve or create stronger cloud security.

Updating Exchange 2013 can be a messy experience if not done correctly. You can end up with a data loss or server down issue. I have created this procedure that I and my team use...

Recovery Database – Exchange 2013 I had a situation in which my client had lost an Exchange Server and it wasn’t recoverable. They also lost a Database in the mix up and we had to recover...

The business world is in the midst of another rapid technological change and ferocious competition. Companies are managing their capital and operating budgets with a keen eye on operations and the future. Department budgets are...

Are you considering outsourcing IT to a managed service provider? If not, do you know about the benefits of doing so? Many organizations are turning to Managed Service Providers (MSPs) to help alleviate some of the...

Are you still relying on your gut to make key business decisions and identify growth opportunities? With the rise of Business Intelligence (BI), in-depth reporting has eliminated making misguided decisions. The infographic below provides examples...

It’s the age-old question that we are all thinking: “How can I do more with less?” In today’s unstable economy, many organizations are looking to cut costs any way they can and outsourcing IT functions...

The influx of consumer owned devices into the enterprise environment has sparked data loss fears within many IT organizations. The concept of bring your own device – or BYOD - has gained momentum in the...

If you haven't already heard, something big is happening…….. As of April 8, 2014, Windows XP will no longer be a supported platform. What does this mean? Microsoft will no longer create security patches or...

How secure is your personal information? Many people cannot answer that question confidently, and that’s a problem. Recent revelations about the NSA’s accumulation of personal information has raised a collective awareness of data security. We once assumed...