Making the change to remote work?
We're happy to help you stay connected

Learn more
View post: The Best of Both Worlds:  SecuriSync and File Servers
, , , , , ,

The Best of Both Worlds: SecuriSync and File Servers

Posted on December 14, 2015

Traditional file servers became popular in the business world because they facilitate access to files inside a company’s network. But your customers’ needs may have evolved, and […]

View post: Security Intelligence discusses insider risk
, , ,

Security Intelligence discusses insider risk

Posted on December 2, 2015

I just read this Security Intelligence article by David Strom and was happy to see him discuss our 2015 Insider Risk Report. It’s great to see outside opinions about this risk, […]

View post: It’s not the end of the world: Recovering deleted items in Outlook
,

It’s not the end of the world: Recovering deleted items in Outlook

Posted on October 14, 2015

It’s probably happened to everyone: you meant to hit “reply” and accidentally hit “delete” instead. The good news is that deleting items by mistake does not […]

View post: What is “Autodiscover”—and why do I need it?
, , ,

What is “Autodiscover”—and why do I need it?

Posted on September 8, 2015

The Microsoft Exchange environment can be quite complicated. There are a ton of Fully Qualified Domain Names (FQDNs) for servers, which gives you a lot to memorize when you configure clients […]

View post: Optimizing and troubleshooting Outlook for Mac OS X
, ,

Optimizing and troubleshooting Outlook for Mac OS X

Posted on October 2, 2014

Update Feb 2015: Are you using Outlook 2015 for OS X? Read the note at the bottom. I’m a Mac user. And Outlook for Mac makes me sad. That’s because, when compared to its Windows […]

View post: How to stop spam, part III: Leverage your provider’s spam filters
, ,

How to stop spam, part III: Leverage your provider’s spam filters

Posted on June 27, 2014

In part 1 of our How to Stop Spam series, we gave you tips on how to stay under the spammers’ radar. In part 2, we talked about spoofing. Now, in our final installment, we will tackle […]

View post: How to stop spam, part II: Prevent spoofing with SPF
, , ,

How to stop spam, part II: Prevent spoofing with SPF

Posted on June 10, 2014

Read Part I of How to Stop Spam. Many of us know malicious email when we see it… or so we think. Then, one day, you receive a strange email from a friend asking you send 1,000 dollars […]

View post: How to stop spam, part I: Stay under the spam radar
, ,

How to stop spam, part I: Stay under the spam radar

Posted on June 4, 2014

The economics of spam is enough to make you cry. All these Viagra salesmen and mortgage scammers are salivating over their computers, knowing that if they can find one sucker in ten million […]

View post: The top 10 requirements for making your business mobile
, , , , , , , , ,

The top 10 requirements for making your business mobile

Posted on February 14, 2014

If you read our Small + Medium Business Mobile Trends Report, you might be wondering if Apple is the best platform for your business. What about Android? What about BlackBerry?Here’s […]

View post: Can you use SecuriSync like an FTP server for content files?
,

Can you use SecuriSync like an FTP server for content files?

Posted on January 23, 2014

  I was talking to a SecuriSync customer the other day. He asked me about embedding SecuriSync links into webpages. Could they use SecuriSync kind of like an FTP server for content […]