LME Blog
Be Careful When You Choose “Remember Me” on Sensitive Websites
When you login to a website you will be presented with a convenient choice to “Remember me for XX days” The problem with this helpful little option is that when you allow the website to perform this action for you, there is now a cookie left on your computer that … Read more
Avoid The Risks Of An Un-Patched Router
If you or someone in your organization doesn’t regularly patch routers you are leaving a backdoor to your operations. Because your router is exposed to the internet, hackers can scan for your type of router and sneak in using these zero-day flaws and when that happens They Search Your Data … Read more
Fully Managed IT Support vs. In-House IT: Which is Right for Your Business.
Defining Managed IT Services and In-House IT When it comes to managing your business’s IT infrastructure, two primary options are available: hiring an in-house IT team or outsourcing to a fully managed IT support provider. Both approaches have their advantages, and the right choice depends on various factors, including your … Read more
The Role of Fully Managed IT Support in Business Continuity and Disaster Recovery.
Defining Business Continuity and Disaster Recovery In today’s fast-paced business environment, organizations must prioritize their resilience against disruptions, whether from natural disasters, cyberattacks, or operational failures. Two critical concepts that come into play are Business Continuity and Disaster Recovery (BCDR). Fully managed IT support plays a vital role in developing … Read more
The Role of Managed IT Services in Chicago’s Growing Healthcare Industry
The Growing Healthcare Industry in Chicago Chicago’s healthcare industry is rapidly expanding, driven by advancements in medical technology, the rise of telehealth, and the increasing demand for efficient patient care. From hospitals and clinics to specialized medical practices, healthcare providers are constantly evolving to meet the needs of a diverse … Read more
How Managed IT Services Support Chicago’s Remote and Hybrid Workforces
Introduction: The Rise of Remote and Hybrid Work in Chicago The shift toward remote and hybrid work has dramatically changed how businesses in Chicago operate. From tech startups to professional service firms, many companies now rely on flexible work arrangements to attract top talent, boost productivity, and adapt to a … Read more
Why Managed IT Services are Critical to Cybersecurity Success for Chicago’s Growing Tech Sector
Chicago’s tech sector is booming, attracting startups and established businesses alike. With this rapid growth comes an increased need for robust cybersecurity measures to protect sensitive data and intellectual property. Managed IT services are becoming a cornerstone of cybersecurity success for companies navigating this complex environment, offering expert guidance, cost-effective … Read more
How Chicago SMBs Can Leverage Cybersecurity Consulting to Protect Against Emerging Threats
Small and medium-sized businesses (SMBs) in Chicago face an ever-growing list of cybersecurity threats. From ransomware attacks to data breaches, the evolving digital landscape puts SMBs at risk. Cybersecurity consulting services offer a valuable lifeline, helping local businesses navigate these threats with tailored, expert guidance. In this article, we’ll explore … Read more
Why Fully Managed IT Support is Essential for Scaling Your Business
As your business grows, so do its technology needs. Managing IT infrastructure, optimizing performance, and ensuring security become increasingly complex tasks. That’s where fully managed IT support comes in. For businesses looking to scale efficiently, partnering with a fully managed IT provider is essential. It provides the flexibility, expertise, and … Read more
Fully Managed IT Support: A Proactive Approach to Cybersecurity
In today’s digital landscape, cybersecurity is a top priority for businesses of all sizes. With cyber threats growing in sophistication, it’s no longer enough to react to security breaches after they happen. A fully managed IT support approach focuses on proactive cybersecurity measures to prevent attacks, secure sensitive data, and … Read more
Top 10 Things To Look For When Hiring Managed IT Support
Finding the right managed IT support near me is essential for any business looking to protect its IT infrastructure, improve efficiency, and reduce operational downtime. With so many providers to choose from, it can be overwhelming to decide which one will best serve your business. To simplify the process, we’ve … Read more
Managed IT Services: How to Get the Right Tech Support
In today’s fast-paced digital world, businesses of all sizes rely on technology to operate efficiently and securely. Whether you’re a startup or a well-established business, ensuring your IT infrastructure runs smoothly is essential. Managed IT services in Chicago can provide the tech support needed to keep your business running without … Read more
How to Set up a Password Manager for Your Law Firm
When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious program or falling for a phishing email In these common hacking scenarios, we have 3 main concerns regarding what … Read more
The LME Services Origin Story
Every great company has an origin story and as LME celebrates 30 years in the IT and cybersecurity industry, we sat down with CEO Joe Engelking and founder Leon Engelking to share the inspiration and milestones that have made the company what it is today. What did cybersecurity mean? … Read more
What happened with the Crowdstrike Outage
WTF happened with the CrowdStrike Outage First Off, who (or what) is CrowdStrike? Similar to Norton, Symantec, or McAfee – CrowdStrike is a cybersecurity company that provides endpoint protection, threat intelligence, and incident response services against malware, ransomware, and advanced threats They had made significant gains in the industry and … Read more
How to Increase the Delivery Rate of Your Emails Sent to Gmail
In February, Gmail greatly tightened its spam monitoring which has greatly affected email delivery to gmail accounts. Here is how to increase the delivery rate of your emails to Gmail or Google Workspace email accounts: Enact these three security protocols on your emails Clean-up your Email List because low open … Read more
How to Eeasily Find Diagnose if a File or Website Is a Virus
With the preponderance of new e-mail scams coming out each month, it is ever more important to make sure that you know if a file or website contains a virus Viruses can be sent as attachments, download links, websites, or via services like DropBox, SharePoint, or newer tools like Frame.IO … Read more
Outlook “Keep Your Account Secure” Error Fix
Fix Outlook Error – Keep Your Account Secure – Update Browser From time to time an Office 365 Outlook account will pop up with an error message stating that to keep your account secure, you need to update your browser – this is how to fix that Outlook error. … Read more
Don’s I.T. Story
Don’s I.T. Story May Sound Familiar Don Gould originally reached out because his law firm wanted to get away from the solo I.T. Consultant that had been dealing with for 8 YEARS! He liked his old guy but response times were getting too inconsistent; sometimes his consultant would answer … Read more
How to Set up a Password Manager for Your Startup Business
When cyber security consultants address the security concerns of a startup business, we want to work off of what happens when a computer gets breached either because of installing a malicious program or falling for a phishing email In these common hacking scenarios, we have 3 main concerns regarding … Read more
How to Set up a Password Manager for Your Law Firm
When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious program or falling for a phishing email In these common hacking scenarios, we have 3 main concerns regarding … Read more
Step by Step Guide to Create a Reoccuring Teams Webinar
Welcome to our step-by-step guide on how to create a recurring Teams webinar Start by opening Microsoft Teams (Work or School) on your computer On the left-hand side select CALENDAR Now Select NEW MEETING Where it says DOES NOT REPEAT click and select your recurring option. If, like me, you … Read more
How to Clear Passwords from Chrome and Stop It from Asking to Store Passwords
When a computer gets hacked, automated tools will scrape and steal all the passwords you have saved in your browser’s built-in password managers. For this reason, we have all our clients use secured password managers like 1Pass and Keeper rather than Chrome or Edge’s password management features. How … Read more
Why Do Hybrid Work Environments Need Cybersecurity
With a hybrid work environment, where employees work both remotely and in an office, you will need to rethink the risks associated with employees taking their work home: 1. **Increased Attack Surface**: With employees accessing company resources from various locations and devices, the attack surface increases. Cybercriminals may exploit … Read more
How to Stop Shared Mailbox from Showing up in Outlook for Microsoft 365
If you have access to a shared mailbox in Office 365, by default the mailbox will show up in your Outlook account. This is how to stop a shared mailbox from automapping in your Outlook client Open up Windows Powershell on your computer, which is preloaded on Windows … Read more
Wrong Email Address in the to Line
If you have an issue where the TO field on your phone is showing the wrong display name or email address then it is typically a Contact Card issue. To fix when the wrong display name shows up on your phone, ppen up the Contacts App on your Android … Read more
How to Easily Perform an on-Prem Exchange Server to Office 365 Email Migration
After having performed dozens of on-premise Exchange to Office 365 Hosted exchange migrations, the path of least resistance for these email migrations is to use a combination of tool. Microsoft Office 365 has a built-in migration tool we have tested it and it has lots of bugs and has … Read more
How to Pause Azure AD Connect Sync
In order to pause Microsoft Office 365 Entra or Azure AD Connect, you will need to Powershell as simply disabling services will not work Open an elevated Windows PowerShell command and run the following command to set up the Exchange Online module. Install-Module MSOnline Connect to Azure AD with … Read more
The History of Cyber Security
The history of cyber attacks dates back to the early days of computer technology. Throughout this history, cyber attacks have become more complex, diverse, and damaging. The motivations behind attacks have expanded beyond curiosity and notoriety to include financial gain, espionage, and geopolitical objectives. As technology advances, the landscape … Read more
How Has Ransomware and Cyber Attacks Evolved
Ransomware and cyber attacks have evolved significantly over the years, with attackers adopting more sophisticated techniques and strategies. Here are some key trends in the evolution of ransomware and cyber attacks: The evolution of ransomware and cyber attacks underscores the importance of ongoing cybersecurity efforts, including regular updates to security … Read more
Scammers Are Now Using AI to Impersonate Family Members
Scammers have started using artificial intelligence (AI) in various ways to carry out more sophisticated and convincing scams. A new AI scam going around is targeting the elderly. The scammer will call and purport to be their grandson, who then goes on to explain that they are in jail, … Read more
Cyber Security Best Practices for Illinois Law Firms
Securing Your Law Firm: Cyber Security Best Practices for Illinois-Based Firms No matter what type of business you run, the world of digital technology has become an essential part of everyday life. And while there are plenty of benefits that come with it, there are also risks – especially … Read more
How to Fix ELO POS Not Printing
How to Fix ELO Touchscreen Point of Sale System Not Printing We have found that ELO touchscreens with built-in Star printers or Zebra printers will stop printing for seemingly no reason, this is how to diagnose faulty printing on your ELO POS The main printing issue is often … Read more
HP Printer Runs out of Ink Extremely Fast
Does your HP Laserjet, Canon, Epson or Ricoh Printer run out of ink way too fast? A lot of times the print quality is what chews up so much ink. DPI (Dots per inch) is the setting related to print quality, the higher the DPI the more ink the page … Read more
Your Sign-in Settings Don’t Meet Your Organization’s 2-Step Verification Policy
How to Fix Google Error – ‘Your Sign-in Settings Don’t Meet Your Organization’s 2-Step Verification Policy’ When Mandatory 2FA is turned on in Google Workspace, you will likely run into users who are prevented from signing in with the error message – Your sign-in settings don’t meet your organization’s … Read more
LME Services Recognized by GoodFirms
LME Services Recognized by GoodFirms as the Best Company to Work With Digital transformation and automation are revolutionizing the world. Adopting digital solutions is critical for businesses as it enables them to streamline operations, save time, reduce costs, ensure security, enhance productivity, boost profits, and scale without hassles. Outsourcing IT … Read more
What Is ChatGPT
What Is so Special about ChatGPT ChatGPT is a free-to-use A.I. chatbot (artificial intelligence tool) that lets you have Q&A interactions with a chatbot that most in the world would mistake as a human interaction We are now in a space where the internet is creating the internet. These … Read more
Cant Sync Office 365 Sharepoint Site Library
Is your Sharepoint online site SYNC button greyed out or completely missing, well here is the fix First, make sure you have permission to access the site, if you can see the files and folders then you likely do If you’ve gotten to my page then you’ve probably gone … Read more
Office 365 Backup Consultants
Do you have Office 365 and worry about it being properly backed up and monitored? There are loads of backup solutions, services, and recovery services but which one is the best, and who is keeping an eye on it? Have no fear, LME Services has you covered. Office 365 … Read more
Join Our MSP Referral Program – Send a Referral to an MSP and Get PAID
LME Services is looking to grow and we would love your help. We are looking at taking on clients anywhere in the United States so introduce us and if we close a deal then the referrer gets 15% Our MSP referral program is that simple! You introduce us to … Read more
New Windows Computer Won’t Sign in with Office 365 Email Credentials
Is your Office 365 ID not working on your NEW Windows 10 or Windows 11 Computer? Whelp, that’s because it’s not asking for your Microsoft 365 work credentials it’s asking for your personal credentials Huh? I can have 2 Microsoft accounts with the same email address? Yep, this ridiculous … Read more
LME Services Is Now Listed Amongst Upcity’s Top Managed IT Services Providers!
LME Services is thrilled to announce that we are officially a part of the UpCity community of Chicago’s managed IT services providers! LME Services is a mid-sized IT services company that has provided top-rated IT support to Chicago’s community of small- to medium-sized businesses since 1994. From providing MSP … Read more
What a Google User Sees When You Enable 2FA in Google Workspace
Turning on 2-factor authentication for Google Workspace, or any email account, should be mandatory for all email accounts but especially for work email accounts like Google Workspace as studies have shown that 2FA stops 99% of bot and phishing email hacks. How your admin can turn on 2FA … Read more
How IT Services Can Help Businesses Succeed
Technology has become so deeply embedded in our lives that it is hard to imagine a world without it. This is especially true for businesses, which rely on technology to keep their operations running and to gain an advantage over the competition. Utilizing IT services can benefit businesses in countless … Read more
What Is an IT Services Continuity Plan and How Does It Benefit Businesses?
An IT services continuity plan is a strategy that outlines the steps needed to keep an organization’s IT services running during any disruption or disaster. This type of plan helps organizations recover quickly and efficiently, minimizing downtime and financial losses. Let’s take a closer look at what a continuity plan … Read more
Exploring the Difference between Computer Science and Information Technology
If you’re interested in a career in tech, you may be wondering what the difference is between computer science and information technology. While they are both fields related to computers, they do have some distinct differences. Here is an overview of the two disciplines so that you can make … Read more
How to Fix When Wifi Stops Working on Lenovo or Dell Laptop
When the wireless on your laptop stops working either because it connects and the internet doesn’t work or because you get a cannot connect error, the answer is often updates and MORE IMPORTANTLY drivers The first step to diagnosing your wifi issues is to find out if all wireless … Read more
New Email Scam
The latest email scam looks like this: Good afternoon, Please take a look at the attached document ASAP. And have a nice day. The email has an attachment that is a fake google drive HTML page that saves locally to your machine and then kicks off a … Read more
Chapter 3 – Cael
Cael had barely opened the door before her words assailed him, “The King has sent a request for attendance this afternoon.” She handed him the note, which he quickly scanned before placing it on the foyer table. She held herself dignified as always, waiting for some reaction. “Then we … Read more
Chapter 2 – Eyania
She dreaded dealing with the senators, she knew what they called her behind her back, the slit from the slums. Being the only female senator, coupled with representing the poorest village of the Polis was turning out to be a less-than-ideal appointment Her father had warned her, and as … Read more
Cloud Data Migration
How We Plan a Cloud Data Migration Proper data migrations involve 4 basic steps: Moving important or sensitive data and decommissioning legacy systems can put stakeholders on edge. Having a solid plan is a must; however, you don’t have to reinvent the wheel. You can find numerous … Read more
How to Move Your Servers to the Cloud
We capture the physical server Make the container accessible from the target server Part 3: Deploy from the container into the Cloud After the migration: Once the migration process is complete, it is time to verify the results.
What Are the Pros and Cons of Moving to SharePoint Online
SharePoint Online is a file repository service provided by Microsoft’s Office 365 platform. So the question everyone has is, is it a good replacement for a Windows File Server and should I use it? Let’s do a simple Pros and Cons list for SharePoint online The PROs of … Read more
Fix OneDrive & SharePoint Sync Error
Fix OneDrive Error – Your IT Admin Doesn’t Allow Syncing of SharePoint Folder / Library Users can now Sync SharePoint folders via OneDrive rather than the clunky option of opening SharePoint folders via File Explorer (which often loses connection and requires constant re-authentication) How to Setup OneDrive to … Read more
How to Ensure Your Data Never Disappears
Our disaster recovery plan goes something like this “HELP, HELP!” – Dilbert If your server/cloud/laptop/PC were to suddenly crash and be devoid of all the work and information you have stored on it, what would happen? Do you have someone to call and if so, do they have a … Read more
An MSP Break-up Guidebook
Transitioning to a new managed service provider may seem like a daunting process, but it doesn’t have to be. Lawyers are sometimes involved but often the transfer process is cut and dry; it’s your business and you own the network/software, so your current MSP is obligated to provide you … Read more
What Is the Cost to Hire an IT Guy / Gal in Chicago Illinois Versus Hiring an MSP Company
When acquiring IT Help for your business, you have two options: Option 1) Hire an IT Person Option 2) Hire an MSP / IT Services Company What does it cost to hire an I.T. Person There is no shortage of IT professionals available so expect to find … Read more
Can’t Set up Office 365 on Outlook
If you have two-factor authentication and you get this message when trying to set up your office 365 email account within outlook then here is the fix (it is likely a stored password or app password issue) First off, the reason this happens is that Outlook likely has your … Read more
Quantum Observer Effect Is 3rd Dimensional Viewing of the 4th Dimension
Ok, let’s pop out a 4th Dimensional hypothesis on the quantum observer effect A 3-dimensional being that is locked within spacetime cannot properly observe the 4th dimension. In the same way that a 2-dimensional object cannot perceive depth and would merely see a line when looking at a 3-dimensional … Read more
How to Create Office 365 Rule to Turn off Spam Filtering
Often times it’s easier to just turn off Spam Filtering than it is to ask users to keep adding people to Whitelists, so this is how you can create an Office 365 rule to bypass spam filtering Steps to Bypass Spam Filtering in Office 365 Go to Mail … Read more
Create Office 365 Rule to Allow Only Email from Specific Smart Host or IP Addresses
Here is how to tighten up email delivery so that only approved senders, like smarthosts, can send email to your Office 365 accounts Microsoft Exchange servers had a provision to allow only email from specific IP addresses or domains, finding that in Office 365 is a little more difficult as … Read more
How to Stop Your Office 365 and Google Workspace Email Accounts from Getting Hacked
Getting one of your business email accounts hacked CAN AND WILL HAPPEN without proper procedures in place and once that email account gets hacked it can balloon into wire transfer fraud, stolen data, and email blasts that can cause damage to your reputation So here is how to ensure … Read more
Email Audit and Office 365 Search Experts
Law Firms, Accounting Firms & Legal Email Audits – LME Services Can Easily Find and Export All Relevant Office 365 Emails for You 29th Street Capital – Real Estate Investors – Office 365 Audit Case Study 29th Street, a Chicago based Real Estate Investment Company, needed to search … Read more
Chapter 1
He looked forward, through a fog of desolation and impending doom. The forest was waking up, and the cool air was dissolving away into the swampy heat of the forest floor. The stinking fog surrounded him and properly reflected his mood. His presence would soon be known to the deadly … Read more
How to Setup Remote Access to Your Office for FREE during Covid Coronavirus Pandemic
There are many choices when it comes to setting up secure remote access for your business and employees so let’s cover your options and the PROS and CONS of things likes VPNs, Remote Desktop, TeamViewer and other remote work solutions What is a VPN? ( Windows RRAS, Sonicwall … Read more
A Red Scream in a Black Sky – Intro
INTRODUCTION – THE TRAVELER Welcome, my friends, to Erth in its second epoch. As you will soon learn, this Erth is not too dissimilar from your Earth. Rocks, trees, humans, oceans, the same basic building blocks located, more or less, in the same area of the cosmos. As a … Read more
A Red Scream in a Black Sky – Introduction
AN INTRODUCTION – THE TRAVELER Welcome Readers, to Erth Erth, as you will soon learn, is not too dissimilar from the rock you currently inhabit (perhaps a bit more unhinged). In the interest of brevity, as nothing annoys me more than an “introduction”, I would like to skip the … Read more
How to Protect against Remote Desktop Hacking
Like most cybersecurity topics, there is no way to 100% stop remote desktop hacking but we can make it very difficult I have heard from other techs that you should never have RDP open to the outside world and that if you do you have to have a radius … Read more
LME’s IT Services Commended for Superior Customer Sastisfaction
Did you know that in the last decade United States based outsourced IT services has exponentially increased? With LME just a call away, you can access us and our expertise whenever you need us because every business is becoming a digital business, and with so many aspects of your … Read more
What Is Winmail.dat and How Do I Stop It from Happening
Here is how to fix Winmail.dat generated errors on your iPhone or Macbook Winmail.dat is a file that gets created when email clients, usually Apple products like iPhones and MacBooks, can’t parse or properly interpret specific email message formats usually sent by Microsoft Products like Outlook and Office 365. … Read more
Law Firm Transition to MSP Case Study
CASE STUDY – Transitioning from 3rd Party Break/Fix Support to LME Managed Services Hansen and Cleary – Law Firm – MSP Transition Case Study Hansen and Cleary, special education and mental health lawyers, had the goal of transitioning their IT Services and Tech Management away from break/fix hourly … Read more
Start a Service Business with No Risk – Page 1a
Figure out Who You Are, Figure out Who They Are, Figure out How to Honestly Speak to Them Jon opens up google and types in ‘IT Services near me’ to see what his competition looks like (this is what we call Market Research in the Google age). He knows … Read more
What Does Windows 7 End of Life Mean for Your Business
What does Windows 7 End of Life Mean for your Business The end of the Windows 7 lifecycle is set for January 2020, which means that Microsoft is discontinuing all support, security updates and patching for Windows 7 computers. Between now and then, the Windows 7 operating system is in … Read more
Stop Hackers from Remotely Accessing Your Computer via RDP
Here is how to secure your Remote Desktop services and stop hackers from attempting to brute force passwords to your work computers If you’re not worried about hackers remotely accessing your computers then let me educate you about RDP (the number one remote access tool). What is RDP & RDC … Read more
eBook Page 3
I am waiting to finish writing this chapter until I see that people are reading and appreciating the previous chapter’s content. If I see people getting to this page then I will upload Chapter 3
eBook Page 2
Step 2 – Register Your Business and Make Your Dreams Really Real Creating a business is so easy these days. Sure, you’re thinking, easy for you… you’re a fucking IT genius and the envy of men all of Chicago. True, I am those things (and more) but seriously, step … Read more
eBook Page 1
Hello, I’m Joe and I make a 6 figure income that grows roughly 15% year over year. I work 15 hours a week and am routinely propositioned to sell my IT Consulting Company for a 4x-8X multiple of my gross. You should listen to me if you want to start … Read more
How to Easily Send Self-Destructing Emails
If your feeling a bit like Chief Quimby in Inspector Gadget and would like your emails to self destruct after you’ve delivered them that we’ve got just the tools. If you use G-Mail, try out the Confidentiality Button You will notice at the bottom of every Gmail … Read more
Disable Spam and Junk Filtering for All Users in Office 365 Using PowerShell with MFA Enabled
Here is how to turn off junk and spam filtering in Office 365 for all users You have to use PowerShell, and it takes a specific set of tools and commands that is rather hard to find with all the different variations of Office 365 setups 1) Connect to Exchange … Read more
Cyber Security Plan
I Woke up and Everything Was Gone Joe woke up to the buzzing of his phone and a hundred texts. “Everything is gone” Their CRM database was corrupted. His domain controller wouldn’t boot and all his files and computers were locked with a ransomware message. It’s frightening how often … Read more
Add Dropbox Functionality to Your Windows Server
For years, people have wanted to add dropbox functionality to their windows servers so that they can easily access their server files while out of the office but businesses were stuck using VPNs, Remote Desktop to connect. The problem, however, is that VPNs are slow and RDP requires you … Read more
LME Services Recognized as a Chicago Leader by Clutch
Open since 1994, LME Services is a Chicago-based, family-run IT services company. Low overhead combined with our unique IT support delivery strategy means that we are able to provide clients an opportunity to get best in class tech support, network design, project management and technology consulting at a surprisingly … Read more
Best Brewpubs and Bottle Shops in Chicago
The Best Craft Beer Brewpubs, and Bottle Shops to Visit While in Chicago (and the Burbs) If you’re looking at my navigation bar and notice that this is a tech consulting stuff and are wondering to yourself what credentials I would have to tell you where to go for … Read more
SEO Case Study
SEO CASE STUDY – California Law Firm SEO Implementation Law Office of Alexandra R. McIntosh – Lawyer Alexandra McIntosh, a San Diego County based Law Firm, had the goal of increasing business by generating more leads and traffic from their website and online presence. THE CHALLENGE … Read more
Google Plus Hacked
Google Plus Was Hacked And… No One Cares Breaking news came out of Silicon Valley this week when Google announced that a major security flaw had exposed the data of nearly all of the 47 active Google Plus users (none of which were Google employees). In all seriousness, Google’s failed … Read more
How to Hack WiFi Passwords in 3 Easy Steps
Want to learn how to hack a WiFi password or, in our case, protect yourself from WiFi hacking then here are the steps hackers use to crack your wifi password First things first, what the heck is going on with WiFi security these days..?! WPA and WPA2 Wifi Security Kinda … Read more
Dell OptiPlex Won’t Boot after SSD Clone of Windows 10
I recently had an issue where I had used Acronis clone to image Windows 10 from a SATA HDD over to SanDisk SSD and after the cloning the Dell OptiPlex 3040 would not boot up. I googled and got all the usual answers, run MBR fixes, try cloning with … Read more
There Is No Excuse for Not Having Encryption, Just Ask the Lawyers
Encryption has become such a mainstream security option because of its vital role in the security process, the ease of which to get it and the necessary role it plays in protecting sensitive data so because of these reasonings, there is no excuse (both legally or morally) not to … Read more
LifeLock Unlocked by Security Flaw
Identity theft protection firm LifeLock recently fixed a vulnerability on its site that exposed their customer’s email addresses to anyone with a basic understanding of how to use a web browser. Lifelock, more like LifeUnlock, am I right… Sorry about that… Bad Pun aside, here’s what happened on LifeLock’s website … Read more
How to Connect to Office 365 Email with a New Device When Multi-Factor Authentication Is Turned On
The important item to note is that when Multi-Factor Authentication is turned on, your regular Office 365 password will not work when you attempt to add (or resume using) your computer, phone or tablet. To connect your Office 365 Hosted Exchange Email to your new device, you have to … Read more
How to Get 200 Daily Visitors to Your Website
How LME’s Website Got to 200 Daily Visitors and Yours Can Too When I took over our website we had zero visitors. It had our company name a picture of our restored 66′ Dodge Charger. So one of my first points of action was to learn about SEO, get … Read more
Texas Cancer Center Ordered to Pay $4.3 Million Fine for HIPAA Violation
The U.S. Department of Health and Human Services ruled that The University of Texas MD Anderson Cancer Center violated the HIPAA Act and was ordered to pay $4.3 million to the OCR. MD Anderson is both a degree-granting academic institution and a comprehensive cancer treatment and research center located … Read more
Why Is Gmail Treating My Exchange Server’s Domain Emails as Spam
Here is how to fix when Gmail, Hotmail or Yahoo is treating your work domain emails like spam There is likely an issue with your domain’s hosted DNS records, specifically your SPF, DMARC or DKIM Records. Why does GMAIL flag your email as spam? Gmail, Yahoo, and Hotmail … Read more
The Easy and Free Way to Record and Send an Error Message
People that have tech issues often forget why an error occurred when they explain it to us later (or things will work without issue when they try to show us). All you have to do to RECORD your entire screen is use the Steps Recorder. OR you can snap a picture … Read more
Why You Need to Turn on 2 Factor Authentication
You need to turn on 2 Factor Authentication pronto because its the only way to A) know if someone is trying to get in and B) if someone has your password. Here’s a quick story about someone who always rebuked turning on 2FA: A client has a cloud … Read more
How to Choose an IT Managed Services Provider
To begin understanding how to choose an IT Managed Services Provider, you need to understand what the heck an MSP is in the first place. Simply put, an MSP is an I.T. Consulting company that charges you a monthly fee for your tech support. If you try to purchase … Read more
CASE STUDY – Transitioning from Break/Fix Support to Managed Services
Prairie Contractors, Inc. – General Contractor Prairie Contactors, a general contractor and construction services company, had the goal of transitioning their IT Services and Tech Management away from break/fix hourly IT Support to Managed IT Services. THE CHALLENGE Prairie Contractors had gotten into a common scenario of … Read more
LME among Top Managed Services Providers
Clutch, an independent market research firm based in Washington DC recently released of the list of the top IT services firms in the chicago area, and we are proud to announce that we landed on the list of the most highly rated managed service providers in Chicago. … Read more