Tech Thursday: What is a Data Retention Policy?

How many messages are in your inbox? Even those of us who subscribe to Inbox Zero may have thousands of messages squirreled away in subfolders or archived mailboxes.

Now multiply that number across all of the users in your company -- and add in your file server, your SharePoint sites, and other places where documents accumulate.

Tech Thursday: How To Create a Disaster Recovery Plan

Tech Thursday: How To Create a Disaster Recovery Plan

Previously, we’ve talked about creating a backup plan and choosing backup solutions that will protect your vital data. Once those two pieces are in place, the final step is to create a disaster recovery plan -- a document that outlines how to use those backups to get your company up and running again after a major outage.

Tech Thursday: Choose a Backup Solution That Meets Your Needs

Tech Thursday: Choose a Backup Solution That Meets Your Needs

Last week, we talked about how to develop a backup plan that will protect your data in the event of a major problem -- a hardware failure, malware infection, natural disaster, or something else.

This week, we’ll look at different kinds of backup solutions, and how to choose the ones that make the most sense for your needs and budget.

Tech Thursday: How To Develop a Backup Plan

Tech Thursday: How To Develop a Backup Plan

Threats to your company’s data are very real, and are increasing at an alarming pace. Whether it’s a hacker, malware, or a physical disaster like fire or flood, as a system administrator, you need to be sure that your data is protected and that it can be recovered quickly and easily in the event of a disaster.

Tech Thursday: How To Enable DKIM Signing in Office 365

Tech Thursday: How To Enable DKIM Signing in Office 365

Last week, we covered how to enable SPF records to prevent spammers from spoofing your domain. DKIM, or DomainKeys Identified Mail, provides another layer of protection against spammers by signing all outgoing messages with a private key. Receiving mail servers can then verify that signature to know that the message came from your organization.

Tech Thursday: Train Your Users to Avoid Spam

Tech Thursday: Train Your Users to Avoid Spam

Of the millions of emails that flow through the Internet each day, more than half of them are spam -- unwanted email messages that clutter our inboxes and bog down our workflows. Many of these messages include malicious code and attachments, or point users to sites that attempt to steal their credentials.