• Why the enterprise can't shake its email addiction

    Posted July 15, 2013 - 11:37 am

    The kids may have moved on, but business users love (and hate) their email. Here's why we can't kick the habit.
  • 7 days without email: Taming the tyrant

    Posted April 30, 2013 - 1:21 pm

    Can one work productively without email? Kevin Purdy tried it so you don't have to.
  • 7 days in email hell

    Posted July 6, 2011 - 9:48 am

    The author vows to read and reply to all email for one week. Can he tame the wicked beast?
  • Unified Communications Promises Much, But Does It Deliver?

    Posted September 10, 2009 - 4:45 pm

    If you want to move forward with UC, early adopters have advice about planning projects and measuring returns.
  • City of Carlsbad connects to the cloud

    Posted May 18, 2009 - 5:11 pm

    For Gordon Peterson, director of IT for the city of Carlsbad, Calif., Microsoft's Business Productivity Online Suite is both a hosted e-mail service and a disaster-recovery plan. The data is hosted at a Microsoft owned and operated data center in Redmond, Wash., and mirrored to a second site in Virginia. "There's full failover," Peterson says.
  • What Your Personal E-Mail Provider Says About You

    Posted April 13, 2009 - 11:14 am

    Almost everyone has a personal e-mail account today, and which provider you choose says a lot about who you are and what you stand for.
  • Top 10 tech embarrassments you'll want to avoid

    Posted December 18, 2008 - 6:06 pm

    Thanks to the ease, speed, and reach of technology, we now have the potential to be bigger doofuses in front of more people than at any other time in history. Here are ten examples of real people who have been shamed by technology, along with some ways you can avoid a similar fate -- lest you end up in articles like this one.
  • Patch those computers, the boogeyman is coming!

    Posted December 11, 2008 - 10:54 am

    Security companies like to make shocking claims so that we will be convinced to use their products. And while part of that is just marketing, the fact is, we do need to be shocked out of our complacency every now and then. We need to be told that the boogeyman is out there and he’s going to get our computer one day.
  • Fake Greeting Card Emails Resurface

    Posted November 5, 2008 - 9:57 am

    According to security expert Bill Mullins, in the last year, email inboxes have being swamped with similar scamming emails from fraudulent sites like, and, amongst others.

  • Educate your email users about phishing

    Posted November 4, 2008 - 8:04 am

    Last week one of my clients received the resurfaced American Express phishing email. And yesterday an associate told me a dastardly story about being fleeced out of $2,700 from his Citibank account. This was the result of responding to a phishing email.
  • E-mail blunders: Top 10 dumbest moments of 2008

    Posted October 30, 2008 - 9:24 am

    What do Halloween and a sent e-mail have in common? Both can be equally frightening. Here are some of the scariest e-mail blunders of 2008.
  • Microsoft Exchange LCR Compliments Archiving

    Posted October 28, 2008 - 11:57 am

    Recently I had an opportunity to meet with an associate and email administrator in New York City named Lisa Bruno. She and her team are involved in a Lotus Notes-to-Microsoft Exchange migration. Lisa shared some interesting insights. Having recently migrated to Exchange 2007, one of the many questions we find is ‘what to use for backup?’.
  • How do email addresses end up on spam lists?

    Posted October 27, 2008 - 6:48 am

    Every day, millions of people receive dozens of unsolicited commercial emails, known popularly as “spam.” Some users see spam as a minor annoyance, while others are so overwhelmed with spam that they are forced to switch email addresses.
  • Importance of state security laws go beyond borders

    Posted October 14, 2008 - 5:42 am

    Sometimes an individual state law becomes de facto national legislation, as was the case with California’s SB1386. This law requires any company that maintains personal data about a resident of California, provide notification in the event of a breach.
  • AES Encryption Email

    Posted October 14, 2008 - 4:44 am

    In my last post I talked about encryption algorithms Data Encryption Standard (DES) and triple DES (3DES). Other encryption algorithms include RC4, RC5, RC6 (proprietary encryption ciphers named after Dr. Ronald Rivest of what is now RSA Security) and the more recently approved standard, Advanced Encryption Standard (AES).
  • Protecting yourself in hotel networks

    Posted October 14, 2008 - 4:36 am

    Like most of us, whenever I travel somewhere, I enjoy the convenience of a hotel that has in-room Internet connectivity. It’s essential to keep up with email while on the road, and at times, I’ve had to resort to logging in from Internet cafes.
  • Virtual vs. Physical Appliances: 4 Compelling Reasons for Change

    Posted October 10, 2008 - 12:26 pm

    Virtual v’s Physical Appliances – 4 compelling reasons for change Executive Summary
  • Administrator Swiss Army Knife

    Posted October 10, 2008 - 5:47 am

    Although administrators may have an excellent server based SMTP spam filter in place, some email helpdesk requests may require some additional effort or research to resolve. Wouldn’t it also be nice to receive advanced intelligence, before we have to address global email threats?
  • Balancing Regulation Compliance with Archiving Strategy Costs

    Posted October 10, 2008 - 5:40 am

    The storage of very large volumes of email represents both an asset and a liability. There are powerful reasons for accessing stored email messages. This can include compliance with laws and regulations that require long retention periods and supervision of email.
  • Applying Military Tactics to War on Spam

    Posted October 3, 2008 - 10:29 am

    Consider your email infrastructure as a position which must deflect daily spammer assaults. As a tactical network commander, you must consider 3 fronts:
Join us:






Join today!

See more content
Ask a Question