LME Blog

Be Careful When You Choose “Remember Me” on Sensitive Websites

When you login to a website you will be presented with a convenient choice to “Remember me for XX days” The problem with this helpful little option is that when you allow the website to perform this action for you, there is now a cookie left on your computer that … Read more
Read the Article

Avoid The Risks Of An Un-Patched Router

If you or someone in your organization doesn’t regularly patch routers you are leaving a backdoor to your operations. Because your router is exposed to the internet, hackers can scan for your type of router and sneak in using these zero-day flaws and when that happens They Search Your Data … Read more
Read the Article

Fully Managed IT Support vs. In-House IT: Which is Right for Your Business.

Defining Managed IT Services and In-House IT When it comes to managing your business’s IT infrastructure, two primary options are available: hiring an in-house IT team or outsourcing to a fully managed IT support provider. Both approaches have their advantages, and the right choice depends on various factors, including your … Read more
Read the Article

The Role of Fully Managed IT Support in Business Continuity and Disaster Recovery.

Defining Business Continuity and Disaster Recovery In today’s fast-paced business environment, organizations must prioritize their resilience against disruptions, whether from natural disasters, cyberattacks, or operational failures. Two critical concepts that come into play are Business Continuity and Disaster Recovery (BCDR). Fully managed IT support plays a vital role in developing … Read more
Read the Article
managed IT services in Chicago

The Role of Managed IT Services in Chicago’s Growing Healthcare Industry

The Growing Healthcare Industry in Chicago Chicago’s healthcare industry is rapidly expanding, driven by advancements in medical technology, the rise of telehealth, and the increasing demand for efficient patient care. From hospitals and clinics to specialized medical practices, healthcare providers are constantly evolving to meet the needs of a diverse … Read more
Read the Article
managed IT services Chicago

How Managed IT Services Support Chicago’s Remote and Hybrid Workforces

Introduction: The Rise of Remote and Hybrid Work in Chicago The shift toward remote and hybrid work has dramatically changed how businesses in Chicago operate. From tech startups to professional service firms, many companies now rely on flexible work arrangements to attract top talent, boost productivity, and adapt to a … Read more
Read the Article
cybersecurity services Chicago

Why Managed IT Services are Critical to Cybersecurity Success for Chicago’s Growing Tech Sector

Chicago’s tech sector is booming, attracting startups and established businesses alike. With this rapid growth comes an increased need for robust cybersecurity measures to protect sensitive data and intellectual property. Managed IT services are becoming a cornerstone of cybersecurity success for companies navigating this complex environment, offering expert guidance, cost-effective … Read more
Read the Article
cybersecurity services Chicago

How Chicago SMBs Can Leverage Cybersecurity Consulting to Protect Against Emerging Threats

Small and medium-sized businesses (SMBs) in Chicago face an ever-growing list of cybersecurity threats. From ransomware attacks to data breaches, the evolving digital landscape puts SMBs at risk. Cybersecurity consulting services offer a valuable lifeline, helping local businesses navigate these threats with tailored, expert guidance. In this article, we’ll explore … Read more
Read the Article
Fully Managed IT Support

Why Fully Managed IT Support is Essential for Scaling Your Business

As your business grows, so do its technology needs. Managing IT infrastructure, optimizing performance, and ensuring security become increasingly complex tasks. That’s where fully managed IT support comes in. For businesses looking to scale efficiently, partnering with a fully managed IT provider is essential. It provides the flexibility, expertise, and … Read more
Read the Article
fully managed IT support

Fully Managed IT Support: A Proactive Approach to Cybersecurity

In today’s digital landscape, cybersecurity is a top priority for businesses of all sizes. With cyber threats growing in sophistication, it’s no longer enough to react to security breaches after they happen. A fully managed IT support approach focuses on proactive cybersecurity measures to prevent attacks, secure sensitive data, and … Read more
Read the Article
managed IT support near me

Top 10 Things To Look For When Hiring Managed IT Support

Finding the right managed IT support near me is essential for any business looking to protect its IT infrastructure, improve efficiency, and reduce operational downtime. With so many providers to choose from, it can be overwhelming to decide which one will best serve your business. To simplify the process, we’ve … Read more
Read the Article
managed IT services Chicago

Managed IT Services: How to Get the Right Tech Support

In today’s fast-paced digital world, businesses of all sizes rely on technology to operate efficiently and securely. Whether you’re a startup or a well-established business, ensuring your IT infrastructure runs smoothly is essential. Managed IT services in Chicago can provide the tech support needed to keep your business running without … Read more
Read the Article

How to Set up a Password Manager for Your Law Firm

When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious program or falling for a phishing email In these common hacking scenarios, we have 3 main concerns regarding what … Read more
Read the Article

The LME Services Origin Story

Every great company has an origin story and as LME celebrates 30 years in the IT and cybersecurity industry, we sat down with CEO Joe Engelking and founder Leon Engelking to share the inspiration and milestones that have made the company what it is today. What did cybersecurity mean?   … Read more
Read the Article

What happened with the Crowdstrike Outage

WTF happened with the CrowdStrike Outage First Off, who (or what) is CrowdStrike? Similar to Norton, Symantec, or McAfee – CrowdStrike is a cybersecurity company that provides endpoint protection, threat intelligence, and incident response services against malware, ransomware, and advanced threats They had made significant gains in the industry and … Read more
Read the Article

How to Increase the Delivery Rate of Your Emails Sent to Gmail

In February, Gmail greatly tightened its spam monitoring which has greatly affected email delivery to gmail accounts.  Here is how to increase the delivery rate of your emails to Gmail or Google Workspace email accounts: Enact these three security protocols on your emails Clean-up your Email List because low open … Read more
Read the Article

How to Eeasily Find Diagnose if a File or Website Is a Virus

With the preponderance of new e-mail scams coming out each month, it is ever more important to make sure that you know if a file or website contains a virus Viruses can be sent as attachments, download links, websites, or via services like DropBox, SharePoint, or newer tools like Frame.IO … Read more
Read the Article

Outlook “Keep Your Account Secure” Error Fix

Fix Outlook Error – Keep Your Account Secure – Update Browser   From time to time an Office 365 Outlook account will pop up with an error message stating that to keep your account secure, you need to update your browser – this is how to fix that Outlook error. … Read more
Read the Article

Don’s I.T. Story

Don’s I.T. Story May Sound Familiar   Don Gould originally reached out because his law firm wanted to get away from the solo I.T. Consultant that had been dealing with for 8 YEARS! He liked his old guy but response times were getting too inconsistent; sometimes his consultant would answer … Read more
Read the Article

How to Set up a Password Manager for Your Startup Business

  When cyber security consultants address the security concerns of a startup business, we want to work off of what happens when a computer gets breached either because of installing a malicious program or falling for a phishing email In these common hacking scenarios, we have 3 main concerns regarding … Read more
Read the Article

How to Set up a Password Manager for Your Law Firm

  When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious program or falling for a phishing email In these common hacking scenarios, we have 3 main concerns regarding … Read more
Read the Article

Step by Step Guide to Create a Reoccuring Teams Webinar

Welcome to our step-by-step guide on how to create a recurring Teams webinar Start by opening Microsoft Teams (Work or School) on your computer On the left-hand side select CALENDAR Now Select NEW MEETING Where it says DOES NOT REPEAT click and select your recurring option. If, like me, you … Read more
Read the Article

How to Clear Passwords from Chrome and Stop It from Asking to Store Passwords

  When a computer gets hacked, automated tools will scrape and steal all the passwords you have saved in your browser’s built-in password managers.  For this reason, we have all our clients use secured password managers like 1Pass and Keeper rather than Chrome or Edge’s password management features.   How … Read more
Read the Article

Why Do Hybrid Work Environments Need Cybersecurity

  With a hybrid work environment, where employees work both remotely and in an office, you will need to rethink the risks associated with employees taking their work home: 1. **Increased Attack Surface**: With employees accessing company resources from various locations and devices, the attack surface increases. Cybercriminals may exploit … Read more
Read the Article

How to Stop Shared Mailbox from Showing up in Outlook for Microsoft 365

  If you have access to a shared mailbox in Office 365, by default the mailbox will show up in your Outlook account.  This is how to stop a shared mailbox from automapping in your Outlook client   Open up Windows Powershell on your computer, which is preloaded on Windows … Read more
Read the Article

Wrong Email Address in the to Line

  If you have an issue where the TO field on your phone is showing the wrong display name or email address then it is typically a Contact Card issue. To fix when the wrong display name shows up on your phone, ppen up the Contacts App on your Android … Read more
Read the Article

How to Easily Perform an on-Prem Exchange Server to Office 365 Email Migration

  After having performed dozens of on-premise Exchange to Office 365 Hosted exchange migrations, the path of least resistance for these email migrations is to use a combination of tool. Microsoft Office 365 has a built-in migration tool we have tested it and it has lots of bugs and has … Read more
Read the Article

How to Pause Azure AD Connect Sync

In order to pause Microsoft Office 365 Entra or Azure AD Connect, you will need to Powershell as simply disabling services will not work   Open an elevated Windows PowerShell command and run the following command to set up the Exchange Online module. Install-Module MSOnline Connect to Azure AD with … Read more
Read the Article

The History of Cyber Security

The history of cyber attacks dates back to the early days of computer technology.   Throughout this history, cyber attacks have become more complex, diverse, and damaging. The motivations behind attacks have expanded beyond curiosity and notoriety to include financial gain, espionage, and geopolitical objectives. As technology advances, the landscape … Read more
Read the Article

How Has Ransomware and Cyber Attacks Evolved

Ransomware and cyber attacks have evolved significantly over the years, with attackers adopting more sophisticated techniques and strategies. Here are some key trends in the evolution of ransomware and cyber attacks: The evolution of ransomware and cyber attacks underscores the importance of ongoing cybersecurity efforts, including regular updates to security … Read more
Read the Article

Scammers Are Now Using AI to Impersonate Family Members

  Scammers have started using artificial intelligence (AI) in various ways to carry out more sophisticated and convincing scams.  A new AI scam going around is targeting the elderly.  The scammer will call and purport to be their grandson, who then goes on to explain that they are in jail, … Read more
Read the Article

How to Increase Email Security

How LME Greatly Reduces Your Risk to Email Hacks                
Read the Article

Cyber Security Best Practices for Illinois Law Firms

Securing Your Law Firm: Cyber Security Best Practices for Illinois-Based Firms   No matter what type of business you run, the world of digital technology has become an essential part of everyday life. And while there are plenty of benefits that come with it, there are also risks – especially … Read more
Read the Article

How to Fix ELO POS Not Printing

How to Fix ELO Touchscreen Point of Sale System Not Printing   We have found that ELO touchscreens with built-in Star printers or Zebra printers will stop printing for seemingly no reason, this is how to diagnose faulty printing on your ELO POS   The main printing issue is often … Read more
Read the Article

HP Printer Runs out of Ink Extremely Fast

Does your HP Laserjet, Canon, Epson or Ricoh Printer run out of ink way too fast? A lot of times the print quality is what chews up so much ink.  DPI (Dots per inch) is the setting related to print quality, the higher the DPI the more ink the page … Read more
Read the Article

Your Sign-in Settings Don’t Meet Your Organization’s 2-Step Verification Policy

How to Fix Google Error – ‘Your Sign-in Settings Don’t Meet Your Organization’s 2-Step Verification Policy’   When Mandatory 2FA is turned on in Google Workspace, you will likely run into users who are prevented from signing in with the error message – Your sign-in settings don’t meet your organization’s … Read more
Read the Article

LME Services Recognized by GoodFirms

LME Services Recognized by GoodFirms as the Best Company to Work With Digital transformation and automation are revolutionizing the world. Adopting digital solutions is critical for businesses as it enables them to streamline operations, save time, reduce costs, ensure security, enhance productivity, boost profits, and scale without hassles. Outsourcing IT … Read more
Read the Article

What Is ChatGPT

What Is so Special about ChatGPT   ChatGPT is a free-to-use A.I. chatbot (artificial intelligence tool) that lets you have Q&A interactions with a chatbot that most in the world would mistake as a human interaction  We are now in a space where the internet is creating the internet.  These … Read more
Read the Article

Cant Sync Office 365 Sharepoint Site Library

  Is your Sharepoint online site SYNC button greyed out or completely missing, well here is the fix First, make sure you have permission to access the site, if you can see the files and folders then you likely do If you’ve gotten to my page then you’ve probably gone … Read more
Read the Article

Office 365 Backup Consultants

  Do you have Office 365 and worry about it being properly backed up and monitored?  There are loads of backup solutions, services, and recovery services but which one is the best, and who is keeping an eye on it? Have no fear, LME Services has you covered. Office 365 … Read more
Read the Article

Join Our MSP Referral Program – Send a Referral to an MSP and Get PAID

  LME Services is looking to grow and we would love your help. We are looking at taking on clients anywhere in the United States so introduce us and if we close a deal then the referrer gets 15% Our MSP referral program is that simple! You introduce us to … Read more
Read the Article

New Windows Computer Won’t Sign in with Office 365 Email Credentials

  Is your Office 365 ID not working on your NEW Windows 10 or Windows 11 Computer?  Whelp, that’s because it’s not asking for your Microsoft 365 work credentials it’s asking for your personal credentials Huh?  I can have 2 Microsoft accounts with the same email address?  Yep, this ridiculous … Read more
Read the Article

LME Services Is Now Listed Amongst Upcity’s Top Managed IT Services Providers!

LME Services is thrilled to announce that we are officially a part of the UpCity community of Chicago’s managed IT services providers!   LME Services is a mid-sized IT services company that has provided top-rated IT support to Chicago’s community of small- to medium-sized businesses since 1994. From providing MSP … Read more
Read the Article

What a Google User Sees When You Enable 2FA in Google Workspace

  Turning on 2-factor authentication for Google Workspace, or any email account, should be mandatory for all email accounts but especially for work email accounts like Google Workspace as studies have shown that 2FA stops 99% of bot and phishing email hacks.   How your admin can turn on 2FA … Read more
Read the Article

How IT Services Can Help Businesses Succeed

Technology has become so deeply embedded in our lives that it is hard to imagine a world without it. This is especially true for businesses, which rely on technology to keep their operations running and to gain an advantage over the competition. Utilizing IT services can benefit businesses in countless … Read more
Read the Article

What Is an IT Services Continuity Plan and How Does It Benefit Businesses?

An IT services continuity plan is a strategy that outlines the steps needed to keep an organization’s IT services running during any disruption or disaster. This type of plan helps organizations recover quickly and efficiently, minimizing downtime and financial losses. Let’s take a closer look at what a continuity plan … Read more
Read the Article

Exploring the Difference between Computer Science and Information Technology

  If you’re interested in a career in tech, you may be wondering what the difference is between computer science and information technology. While they are both fields related to computers, they do have some distinct differences. Here is an overview of the two disciplines so that you can make … Read more
Read the Article

How to Fix When Wifi Stops Working on Lenovo or Dell Laptop

  When the wireless on your laptop stops working either because it connects and the internet doesn’t work or because you get a cannot connect error, the answer is often updates and MORE IMPORTANTLY drivers The first step to diagnosing your wifi issues is to find out if all wireless … Read more
Read the Article

New Email Scam

  The latest email scam looks like this:   Good afternoon, Please take a look at the attached document ASAP. And have a nice day.   The email has an attachment that is a fake google drive HTML page that saves locally to your machine and then kicks off a … Read more
Read the Article

Chapter 3 – Cael

  Cael had barely opened the door before her words assailed him, “The King has sent a request for attendance this afternoon.” She handed him the note, which he quickly scanned before placing it on the foyer table. She held herself dignified as always, waiting for some reaction. “Then we … Read more
Read the Article

Chapter 2 – Eyania

  She dreaded dealing with the senators, she knew what they called her behind her back, the slit from the slums. Being the only female senator, coupled with representing the poorest village of the Polis was turning out to be a less-than-ideal appointment Her father had warned her, and as … Read more
Read the Article

Cloud Data Migration

How We Plan a Cloud Data Migration   Proper data migrations involve 4 basic steps:     Moving important or sensitive data and decommissioning legacy systems can put stakeholders on edge. Having a solid plan is a must; however, you don’t have to reinvent the wheel. You can find numerous … Read more
Read the Article

How to Move Your Servers to the Cloud

We capture the physical server   Make the container accessible from the target server     Part 3: Deploy from the container into the Cloud   After the migration:   Once the migration process is complete, it is time to verify the results.
Read the Article

What Are the Pros and Cons of Moving to SharePoint Online

  SharePoint Online is a file repository service provided by Microsoft’s Office 365 platform.  So the question everyone has is, is it a good replacement for a Windows File Server and should I use it? Let’s do a simple Pros and Cons list for SharePoint online   The PROs of … Read more
Read the Article

Fix OneDrive & SharePoint Sync Error

Fix OneDrive Error – Your IT Admin Doesn’t Allow Syncing of SharePoint Folder / Library   Users can now Sync SharePoint folders via OneDrive rather than the clunky option of opening SharePoint folders via File Explorer (which often loses connection and requires constant re-authentication)   How to Setup OneDrive to … Read more
Read the Article

How to Ensure Your Data Never Disappears

Our disaster recovery plan goes something like this “HELP, HELP!” – Dilbert   If your server/cloud/laptop/PC were to suddenly crash and be devoid of all the work and information you have stored on it, what would happen?  Do you have someone to call and if so, do they have a … Read more
Read the Article

An MSP Break-up Guidebook

  Transitioning to a new managed service provider may seem like a daunting process, but it doesn’t have to be. Lawyers are sometimes involved but often the transfer process is cut and dry; it’s your business and you own the network/software, so your current MSP is obligated to provide you … Read more
Read the Article

What Is the Cost to Hire an IT Guy / Gal in Chicago Illinois Versus Hiring an MSP Company

  When acquiring IT Help for your business, you have two options: Option 1) Hire an IT Person   Option 2) Hire an MSP / IT Services Company   What does it cost to hire an I.T. Person There is no shortage of IT professionals available so expect to find … Read more
Read the Article

Can’t Set up Office 365 on Outlook

  If you have two-factor authentication and you get this message when trying to set up your office 365 email account within outlook then here is the fix (it is likely a stored password or app password issue) First off, the reason this happens is that Outlook likely has your … Read more
Read the Article

Quantum Observer Effect Is 3rd Dimensional Viewing of the 4th Dimension

  Ok, let’s pop out a 4th Dimensional hypothesis on the quantum observer effect A 3-dimensional being that is locked within spacetime cannot properly observe the 4th dimension.  In the same way that a 2-dimensional object cannot perceive depth and would merely see a line when looking at a 3-dimensional … Read more
Read the Article

How to Create Office 365 Rule to Turn off Spam Filtering

Often times it’s easier to just turn off Spam Filtering than it is to ask users to keep adding people to Whitelists, so this is how you can create an Office 365 rule to bypass spam filtering   Steps to Bypass Spam Filtering in Office 365   Go to Mail … Read more
Read the Article

Create Office 365 Rule to Allow Only Email from Specific Smart Host or IP Addresses

Here is how to tighten up email delivery so that only approved senders, like smarthosts, can send email to your Office 365 accounts Microsoft Exchange servers had a provision to allow only email from specific IP addresses or domains, finding that in Office 365 is a little more difficult as … Read more
Read the Article

How to Stop Your Office 365 and Google Workspace Email Accounts from Getting Hacked

  Getting one of your business email accounts hacked CAN AND WILL HAPPEN without proper procedures in place and once that email account gets hacked it can balloon into wire transfer fraud, stolen data, and email blasts that can cause damage to your reputation So here is how to ensure … Read more
Read the Article

Email Audit and Office 365 Search Experts

Law Firms, Accounting Firms & Legal Email Audits – LME Services Can Easily Find and Export All Relevant Office 365 Emails for You   29th Street Capital – Real Estate Investors – Office 365 Audit Case Study   29th Street, a Chicago based Real Estate Investment Company, needed to search … Read more
Read the Article

Chapter 1

He looked forward, through a fog of desolation and impending doom. The forest was waking up, and the cool air was dissolving away into the swampy heat of the forest floor. The stinking fog surrounded him and properly reflected his mood. His presence would soon be known to the deadly … Read more
Read the Article

How to Setup Remote Access to Your Office for FREE during Covid Coronavirus Pandemic

  There are many choices when it comes to setting up secure remote access for your business and employees so let’s cover your options and the PROS and CONS of things likes VPNs, Remote Desktop, TeamViewer and other remote work solutions   What is a VPN? ( Windows RRAS, Sonicwall … Read more
Read the Article

A Red Scream in a Black Sky – Intro

INTRODUCTION – THE TRAVELER   Welcome, my friends, to Erth in its second epoch. As you will soon learn, this Erth is not too dissimilar from your Earth. Rocks, trees, humans, oceans, the same basic building blocks located, more or less, in the same area of the cosmos. As a … Read more
Read the Article

A Red Scream in a Black Sky – Introduction

AN INTRODUCTION – THE TRAVELER   Welcome Readers, to Erth Erth, as you will soon learn, is not too dissimilar from the rock you currently inhabit (perhaps a bit more unhinged). In the interest of brevity, as nothing annoys me more than an “introduction”, I would like to skip the … Read more
Read the Article

How to Protect against Remote Desktop Hacking

  Like most cybersecurity topics, there is no way to 100% stop remote desktop hacking but we can make it very difficult I have heard from other techs that you should never have RDP open to the outside world and that if you do you have to have a radius … Read more
Read the Article

LME’s IT Services Commended for Superior Customer Sastisfaction

  Did you know that in the last decade United States based outsourced IT services has exponentially increased? With LME just a call away, you can access us and our expertise whenever you need us because every business is becoming a digital business, and with so many aspects of your … Read more
Read the Article

What Is Winmail.dat and How Do I Stop It from Happening

Here is how to fix Winmail.dat generated errors on your iPhone or Macbook Winmail.dat is a file that gets created when email clients, usually Apple products like iPhones and MacBooks, can’t parse or properly interpret specific email message formats usually sent by Microsoft Products like Outlook and Office 365.   … Read more
Read the Article

Law Firm Transition to MSP Case Study

CASE STUDY – Transitioning from 3rd Party Break/Fix Support to LME Managed Services   Hansen and Cleary – Law Firm – MSP Transition Case Study   Hansen and Cleary, special education and mental health lawyers, had the goal of transitioning their IT Services and Tech Management away from break/fix hourly … Read more
Read the Article

Start a Service Business with No Risk – Page 1a

Figure out Who You Are, Figure out Who They Are, Figure out How to Honestly Speak to Them   Jon opens up google and types in ‘IT Services near me’ to see what his competition looks like (this is what we call Market Research in the Google age). He knows … Read more
Read the Article

What Does Windows 7 End of Life Mean for Your Business

What does Windows 7 End of Life Mean for your Business   The end of the Windows 7 lifecycle is set for January 2020, which means that Microsoft is discontinuing all support, security updates and patching for Windows 7 computers. Between now and then, the Windows 7 operating system is in … Read more
Read the Article

Stop Hackers from Remotely Accessing Your Computer via RDP

 Here is how to secure your Remote Desktop services and stop hackers from attempting to brute force passwords to your work computers If you’re not worried about hackers remotely accessing your computers then let me educate you about RDP (the number one remote access tool). What is RDP & RDC … Read more
Read the Article

eBook Page 3

I am waiting to finish writing this chapter until I see that people are reading and appreciating the previous chapter’s content.  If I see people getting to this page then I will upload Chapter 3
Read the Article

eBook Page 2

Step 2 – Register Your Business and Make Your Dreams Really Real   Creating a business is so easy these days. Sure, you’re thinking, easy for you… you’re a fucking IT genius and the envy of men all of Chicago. True, I am those things (and more) but seriously, step … Read more
Read the Article

eBook Page 1

Hello, I’m Joe and I make a 6 figure income that grows roughly 15% year over year.  I work 15 hours a week and am routinely propositioned to sell my IT Consulting Company for a 4x-8X multiple of my gross. You should listen to me if you want to start … Read more
Read the Article

How to Easily Send Self-Destructing Emails

  If your feeling a bit like Chief Quimby in Inspector Gadget and would like your emails to self destruct after you’ve delivered them that we’ve got just the tools.   If you use G-Mail, try out the Confidentiality Button   You will notice at the bottom of every Gmail … Read more
Read the Article

Disable Spam and Junk Filtering for All Users in Office 365 Using PowerShell with MFA Enabled

Here is how to turn off junk and spam filtering in Office 365 for all users You have to use PowerShell, and it takes a specific set of tools and commands that is rather hard to find with all the different variations of Office 365 setups 1) Connect to Exchange … Read more
Read the Article

Cyber Security Plan

I Woke up and Everything Was Gone   Joe woke up to the buzzing of his phone and a hundred texts.  “Everything is gone” Their CRM database was corrupted.  His domain controller wouldn’t boot and all his files and computers were locked with a ransomware message.  It’s frightening how often … Read more
Read the Article

Add Dropbox Functionality to Your Windows Server

  For years, people have wanted to add dropbox functionality to their windows servers so that they can easily access their server files while out of the office but businesses were stuck using VPNs, Remote Desktop to connect. The problem, however, is that VPNs are slow and RDP requires you … Read more
Read the Article

LME Services Recognized as a Chicago Leader by Clutch

  Open since 1994, LME Services is a Chicago-based, family-run IT services company. Low overhead combined with our unique IT support delivery strategy means that we are able to provide clients an opportunity to get best in class tech support, network design, project management and technology consulting at a surprisingly … Read more
Read the Article

Best Brewpubs and Bottle Shops in Chicago

The Best Craft Beer Brewpubs, and Bottle Shops to Visit While in Chicago (and the Burbs)   If you’re looking at my navigation bar and notice that this is a tech consulting stuff and are wondering to yourself what credentials I would have to tell you where to go for … Read more
Read the Article

SEO Case Study

SEO CASE STUDY – California Law Firm SEO Implementation   Law Office of Alexandra R. McIntosh – Lawyer   Alexandra McIntosh, a San Diego County based Law Firm, had the goal of increasing business by generating more leads and traffic from their website and online presence.   THE CHALLENGE   … Read more
Read the Article

Google Plus Hacked

Google Plus Was Hacked And… No One Cares   Breaking news came out of Silicon Valley this week when Google announced that a major security flaw had exposed the data of nearly all of the 47 active Google Plus users (none of which were Google employees). In all seriousness, Google’s failed … Read more
Read the Article
How to Hack WiFi Passwords in 3 Easy Steps

How to Hack WiFi Passwords in 3 Easy Steps

Want to learn how to hack a WiFi password or, in our case, protect yourself from WiFi hacking then here are the steps hackers use to crack your wifi password First things first, what the heck is going on with WiFi security these days..?!   WPA and WPA2 Wifi Security Kinda … Read more
Read the Article

Dell OptiPlex Won’t Boot after SSD Clone of Windows 10

  I recently had an issue where I had used Acronis clone to image Windows 10 from a SATA HDD over to SanDisk SSD and after the cloning the Dell OptiPlex 3040 would not boot up. I googled and got all the usual answers, run MBR fixes, try cloning with … Read more
Read the Article
hoffman estates and chicago

There Is No Excuse for Not Having Encryption, Just Ask the Lawyers

  Encryption has become such a mainstream security option because of its vital role in the security process, the ease of which to get it and the necessary role it plays in protecting sensitive data so because of these reasonings, there is no excuse (both legally or morally) not to … Read more
Read the Article

LifeLock Unlocked by Security Flaw

  Identity theft protection firm LifeLock recently fixed a vulnerability on its site that exposed their customer’s email addresses to anyone with a basic understanding of how to use a web browser. Lifelock, more like LifeUnlock, am I right… Sorry about that… Bad Pun aside, here’s what happened on LifeLock’s website   … Read more
Read the Article
Create App Password

How to Connect to Office 365 Email with a New Device When Multi-Factor Authentication Is Turned On

  The important item to note is that when Multi-Factor Authentication is turned on, your regular Office 365 password will not work when you attempt to add (or resume using) your computer, phone or tablet. To connect your Office 365 Hosted Exchange Email to your new device, you have to … Read more
Read the Article

How to Get 200 Daily Visitors to Your Website

How LME’s Website Got to 200 Daily Visitors and Yours Can Too   When I took over our website we had zero visitors. It had our company name a picture of our restored 66′ Dodge Charger. So one of my first points of action was to learn about SEO, get … Read more
Read the Article

Texas Cancer Center Ordered to Pay $4.3 Million Fine for HIPAA Violation

  The U.S. Department of Health and Human Services ruled that The University of Texas MD Anderson Cancer Center violated the HIPAA Act and was ordered to pay $4.3 million to the OCR. MD Anderson is both a degree-granting academic institution and a comprehensive cancer treatment and research center located … Read more
Read the Article

Why Is Gmail Treating My Exchange Server’s Domain Emails as Spam

Here is how to fix when Gmail, Hotmail or Yahoo is treating your work domain emails like spam There is likely an issue with your domain’s hosted DNS records, specifically your SPF, DMARC or DKIM Records.   Why does GMAIL flag your email as spam?   Gmail, Yahoo, and Hotmail … Read more
Read the Article

The Easy and Free Way to Record and Send an Error Message

  People that have tech issues often forget why an error occurred when they explain it to us later (or things will work without issue when they try to show us). All you have to do to RECORD your entire screen is use the Steps Recorder. OR you can snap a picture … Read more
Read the Article

Why You Need to Turn on 2 Factor Authentication

  You need to turn on 2 Factor Authentication pronto because its the only way to A) know if someone is trying to get in and B) if someone has your password. Here’s a quick story about someone who always rebuked turning on 2FA:   A client has a cloud … Read more
Read the Article

How to Choose an IT Managed Services Provider

  To begin understanding how to choose an IT Managed Services Provider, you need to understand what the heck an MSP is in the first place. Simply put, an MSP is an I.T. Consulting company that charges you a monthly fee for your tech support.  If you try to purchase … Read more
Read the Article

CASE STUDY – Transitioning from Break/Fix Support to Managed Services

  Prairie Contractors, Inc. – General Contractor   Prairie Contactors, a general contractor and construction services company, had the goal of transitioning their IT Services and Tech Management away from break/fix hourly IT Support to Managed IT Services.   THE CHALLENGE   Prairie Contractors had gotten into a common scenario of … Read more
Read the Article
Top MSP Consulting Companies in Chicago

LME among Top Managed Services Providers

  Clutch, an independent market research firm based in Washington DC recently released of the list of the top IT services firms in the chicago area, and we are proud to announce that we landed on the list of the most highly rated managed service providers in Chicago.     … Read more
Read the Article

AWARD-WINNING CYBERSECURITY AND I.T. SERVICES

TOP 10% OF ALL REVIEWED I.T. PROVIDERS
UPCITY TOP REVIEWED I.T. PROVIDER
EXPERTISE CURATED TOP PICK
DESIGNRUSH TOP CHICAGO I.T. PROVIDER
RANKED TOP 5 ON GOODFIRM’S TOP CYBERSECURITY PROVIDERS LIST
National IT & Cybersecurity Coverage
Managed IT Services
System Audits/Assessments
Design & Installation
Software Implementation
Custom Software Development
Remote Monitoring
24/7 On-Call Support
Cybersecurity
ISO Consulting
SOC Consulting
HIPAA Consulting
Systems Monitoring
Policy Development
Fraud Prevention
Data Protection
Tools
Download
Contact
Headquarters
Chicago, Illinois
847-496-5196
Schedule a Free Consultation