Making the change to remote work?
We're happy to help you stay connected

Learn more
View post: 6 Realistic Time Management Tips for Remote Workers
, , , , ,

6 Realistic Time Management Tips for Remote Workers

Posted on October 23, 2020

Effective time management is a significant challenge for most remote workers. But it doesn’t have to be. Discussed herein are realistic time management tips that’ll turn you into a telecommuting pro within no time.

View post: Quick Tips: Troubleshooting Outlook connectivity
, ,

Quick Tips: Troubleshooting Outlook connectivity

Posted on June 23, 2016

Introducing Quick Tips: helpful tips from our Support and Product experts for getting the most out of your cloud services. Each installment of our series will tackle a different topic, from […]

View post: What is a PTR record? Do I need one?
, , ,

What is a PTR record? Do I need one?

Posted on February 12, 2016

One of the questions I get asked during email migrations is “What is a PTR record? Do I need one?” The answer to the second question is “Yes, but don’t worry, […]

View post: New email encryption templates make it easier to protect sensitive information
, , , ,

New email encryption templates make it easier to protect sensitive information

Posted on February 2, 2016

Now healthcare, financial services and legal services customers can more easily encrypt sensitive data Regulations such as HIPAA, GLBA and TILA-RESPA identify specific types of information […]

View post: How To Enable ‘Send On Behalf’ Permissions Using Outlook
,

How To Enable ‘Send On Behalf’ Permissions Using Outlook

Posted on January 21, 2016

Do you have an administrative assistant? Do you need to give someone else the ability to send email out or arrange meetings for you? Outlook can help. Outlook lets you name a delegate to […]

View post: The Best of Both Worlds:  SecuriSync and File Servers
, , , , , ,

The Best of Both Worlds: SecuriSync and File Servers

Posted on December 14, 2015

Traditional file servers became popular in the business world because they facilitate access to files inside a company’s network. But your customers’ needs may have evolved, and […]

View post: Security Intelligence discusses insider risk
, , ,

Security Intelligence discusses insider risk

Posted on December 2, 2015

I just read this Security Intelligence article by David Strom and was happy to see him discuss our 2015 Insider Risk Report. It’s great to see outside opinions about this risk, […]

View post: It’s not the end of the world: Recovering deleted items in Outlook
,

It’s not the end of the world: Recovering deleted items in Outlook

Posted on October 14, 2015

It’s probably happened to everyone: you meant to hit “reply” and accidentally hit “delete” instead. The good news is that deleting items by mistake does not […]

View post: What is “Autodiscover”—and why do I need it?
, , ,

What is “Autodiscover”—and why do I need it?

Posted on September 8, 2015

The Microsoft Exchange environment can be quite complicated. There are a ton of Fully Qualified Domain Names (FQDNs) for servers, which gives you a lot to memorize when you configure clients […]

View post: What healthcare companies can learn from Anthem’s data breach
, , , , ,

What healthcare companies can learn from Anthem’s data breach

Posted on February 11, 2015

If you’ve followed the news behind Sony, JP Morgan and other highly publicized breaches, you’ll notice that this latest Anthem breach follows a very familiar trend. Corporate IT […]