Network Administration

How Secure is Your System: Cyber attacks on the rise

2015-08-06T10:45:53+00:00 August 6th, 2015|

Bad news for honest hard-workers: Cyber-attacks are on the rise. Where once someone who disagreed with your business practice might picket outside your office – now they just take down your website. Where criminals used to pickpocket strangers in crowded public places – now they harvest credit card information from retailers who [...]

Import & Export Hyper-V VM’s for Windows Server 2012 R2

2015-06-02T08:30:54+00:00 June 2nd, 2015|

I always strive to write about topics I’ve spent time researching or commonly reference. It’s easy to overlook simple tasks that can save hours of work for all of you. Although Hyper-V 2012 R2 is beginning to find its way into more corporations with the automation assistance of System Center [...]

Create & Populate a VHD with Data from a Host Folder

2015-04-20T09:16:57+00:00 April 20th, 2015|

Well, hey there! It’s been a while since my last post. I was promoted a few months ago to Infrastructure and lately find myself dealing with less SharePoint and more Virtualization. (Hooray for me!) So, I thought we would go all Tarantino on this edition of Steve Writes a Blog and start [...]

Why You Need SolarWinds Log and Event Manager

2015-04-15T08:00:08+00:00 April 15th, 2015|

Security and Auditing Operations Management for HIPAA, PCI, SOX and More Many of our managed hosting customers have compliance needs and security requirements that go beyond the standard network and hardware monitoring, intrusion detection and prevention systems, managed firewalls and password policies. For environments that must comply with HIPAA, PCI DSS, SOX, [...]

Upgrading Software: The factors to consider

2015-03-20T09:09:10+00:00 March 20th, 2015|

How to Plan for Your Next Software Upgrade There comes a time for every company to bite the bullet and investigate upgrading their systems. Regardless of whether you’re talking about hardware or software, upgrading is never so much an “if” as much as it is a “when”. In this case, we’ll [...]

Understanding IIS Bindings Rules and Practices

2015-03-09T09:15:19+00:00 March 9th, 2015|

A Helpful Intro to IIS Bindings Let’s make sure our servers are directing web traffic properly with some basic IIS Bindings rules and practices. While IIS is a powerful tool for hosting sites on Microsoft Servers, we will only be going over the “easy” stuff in this article. However, it’s safe [...]

Secure Your Business with Strict Password Regulations

2015-01-23T08:40:17+00:00 January 23rd, 2015|

Your Safety Starts With Your Password! “12345”… This, as you may have surmised, is the common password of an uninformed person, ignorant to the dangers of the world might have on their luggage or much more seriously, their company web site or email server. As we’ve entered a new year, I hope to [...]

How to Identify and Implement Processes at Your Job

2014-12-10T09:59:01+00:00 December 10th, 2014|

Once you identify the need for solid processes, it’s easy to implement them into your world  Well, we’ve all been there before. That moment when you ask, “How do we get this done?” and the answer becomes “I think we’re supposed to… (insert vague chain of thoughts)”. Kind of the same as asking, [...]

2014 State of Collaboration Security Study

2014-10-29T09:10:32+00:00 October 29th, 2014|

As we finish up National Cyber Security Awareness month, lets focus on the state of collaboration security as it pertains to organizations and their data. Recently, our partner, CipherPoint, published their second annual industry report on the State of Collaboration Security. For the 2014 State of Collaboration Security survey, they [...]

Choosing Between a Static or Dynamic Website

2014-10-17T09:05:21+00:00 October 17th, 2014|

For some, the thought of creating or, more so, recreating their company’s website is scarier than having five missed calls from their mother-in-law. And who could blame them? These days, technology changes faster than FOX programming and the devices we’re using to look at websites are evolving at the same [...]