Making the change to remote work?
We're happy to help you stay connected

Learn more
, , , , , ,

Why Add Cloud Backup — Now More Than Ever

Posted on February 16, 2021

Intermedia Backup for Microsoft 365 is a flexible, agile, and reliable solution that offers comprehensive data protection across the full Microsoft 365 tenant

, , , ,

New email encryption templates make it easier to protect sensitive information

Posted on February 2, 2016

Now healthcare, financial services and legal services customers can more easily encrypt sensitive data Regulations such as HIPAA, GLBA and TILA-RESPA identify specific types of information […]

, , , ,

Make sure your users are educated about cybersecurity risks

Posted on January 4, 2016

I read about it all the time in the news…another company falls victim to cybercrime. Whether it’s a phishing attack or a hacked password, your company can be vulnerable if you […]

, , , , , ,

5 Ways Your Email Could Be At Risk

Posted on December 15, 2015

Nearly all businesses rely on email to assist with day-to-day activities. But many businesses haven’t addressed new and seemingly unavoidable vulnerabilities.  If you are running an […]

, , , , , ,

The Business World’s Riskiest User Will Surprise You

Posted on December 14, 2015

And your customers need to know. Educate them on how to combat risky user security practices and manage access to IT services during employment – and after employment ends. In our 2015 […]

, , , , ,

Ryan Barrett talks IT risk management and compliance with Michael Heller at TechTarget

Posted on December 8, 2015

As we start planning for 2016, I’m sure a lot of us will be focused on “doing more with less”. That includes streamlining processes and finding ways to speed up […]

, ,

McAfee Transition Plan

Posted on December 2, 2015

Recently, Intel® Security announced they were retiring a large number of McAfee® SaaS security services, including email protection and continuity services currently sold by Intermedia […]

, , ,

What is “Autodiscover”—and why do I need it?

Posted on September 8, 2015

The Microsoft Exchange environment can be quite complicated. There are a ton of Fully Qualified Domain Names (FQDNs) for servers, which gives you a lot to memorize when you configure clients […]

,

Fighting the toughest battle in Cybercrime: Spear phishing

Posted on April 24, 2015

Introduction:  Just last week CBS ran a 60 Minutes segment about the cyber-attack on Sony Pictures, and it brought to light the dangers of phishing. Specifically, it highlighted a tactic […]

, , ,

Security: Part IV of the hidden costs of Exchange providers

Posted on December 10, 2014

In case you missed them: Read Part I, Part II, Part III of this series. Here’s where I’m really lucky: Unlike the previous posts in this series, I don’t have a personal horror […]

,

Take the pain out of data ingestion for email archiving

Posted on December 9, 2014

Every year, when tax season approaches, I start the tedious process of gathering all the information I need.  Which usually entails scouring random drawers, looking in unlabeled envelopes […]