-
Continue reading →: 10 Things Your Kids May Never Do
Our daily lives continue to be affected by changing technology. Here are 10 things your kids may never do that were once very common. Our kids are in their 20s and haven’t done many of these. Can you add to this list? Write a check – I still write about…
-
Continue reading →: What is the Second-stage Recycle Bin in Microsoft 365?
Not long ago, a client contacted me because a recently terminated employee allegedly deleted several important files from a SharePoint site before they left. When files are deleted from a SharePoint site or OneDrive for Business, they are moved to the Recycle Bin (also referred to as the First-stage Recycle…
-
Continue reading →: Published Article
I recently had another article published at Experts Exchange – Sync On-Prem AD With Existing Azure AD (now Microsoft Entra ID) Users | Experts Exchange (experts-exchange.com). Here is the link to another published article – IT Basics for Small Businesses | Experts Exchange (experts-exchange.com). As always, feedback is appreciated and…
-
Continue reading →: A Journey to Certified Information Security Manager (CISM)
I have four college degrees but decided to try to get my first certification – ISACA CISM. I chose the CISM, because of my interest in the management side of information security. Over the last several years, I’ve also noticed that IT staff’s focus is now centered around cybersecurity –…
-
Continue reading →: Cybersecurity – Hardening a local area network
Let’s face it, it’s hard to stay ahead of the cyber criminals, but here are some common ways of protecting, referred to as hardening, your Local Area Network (LAN). Many of these hardening suggestions are specifically for an on-prem Windows 2022 server utilizing Group Policy Management. They can be used…
-
Continue reading →: CrowdStrike and Windows, a bit of my history
The events of last week with Crowdstrike and Windows reminded me of a situation I found myself battling around 2006. One Monday morning, we had a client that started reporting infected computers and within a short amount of time, all their computers were affected. It was all hands on deck!…
-
Continue reading →: A bit of my history…
I keep too much stuff. Many of you probably don’t recognize these different computer storage media. When I started my career in the early 80’s, I had a dual 8” floppy drive connected to a HP 9845 computer. It was easier to make copies if you had a dual drive…
-
Continue reading →: Information Technology Planning Guide Framework
This framework identifies the areas of technology that need to be addressed, how your business operates with respect to technology, and what technology can be used to help achieve your business goals. It is a good checklist if you are starting a business or doing an annual review. After all…
-
Continue reading →: IT Basics, Part 6 – Support
Have you tried restarting the computer? Don’t laugh, it fixes a lot of problems. Same goes for other devices too – printers, modems, etc. OK, so you think you’ve got your IT issues covered because one of your staff took some computer classes. It’s helpful that your staff can work…
