LME Services IT Blog

Start a Support Session

LME Services Remote Access Download Download the support tool so LME can access your computer When you want to end the support session, be sure to quit the program. This ensures your … Read more
Read the Article

Write for US – IT Services, Technology, IT Support Guest Blog Posting

We at LME Services are excited to invite skilled writers and IT professionals to contribute to our platform. If you have a passion for information technology, problem-solving, creating insightful content, or have … Read more
Read the Article
IT Support for lawyers

Why Cyber Insurance is No Longer Optional: Protecting Your Business in the Digital Age

Why Cyber Insurance is No Longer Optional: Protecting Your Business in the Digital Age As any IT consulting firm can tell you, cyberattacks can bring devastation to a business. One breach, one … Read more
Read the Article
Managed IT Services support

Want to Sell Your Break-Fix IT Consulting Company? I’ll Buy IT!

Sell Your Break-Fix IT Consulting Company to LME Services If you’re an independent IT consultant or run a break-fix IT company, you’ve probably spent years building relationships, solving problems, and keeping your … Read more
Read the Article
Office 365 Sharepoint support company

Create a SharePoint portal for file uploads

How to Create a SharePoint Portal for Visitors to Upload Files Here are the steps to create a secure SharePoint portal that allows guests to upload files that only they can see … Read more
Read the Article
IT Support for lawyers

The Top Reviewed IT Service Companies in Chicago 2025

Here is an updated list of the top 10 IT services companies in Chicago, now including their updated Google review ratings If you are in the market for IT Services in Chicago, … Read more
Read the Article

How to Transfer Microsoft Authenticator Account to New Phone

How to Transfer Microsoft Authenticator Account to New iPhone or Android If you get a new phone and need to transfer over all your 2FA codes to a new phone you will … Read more
Read the Article

How to Grant Access to a User’s OneDrive Files

How to Give OneDrive Access to Another User From the Office 365 Admin Center Here is a step by step guide on how to give an employee access to another employee’s OneDrive … Read more
Read the Article

How Much Do IT Services Cost in Chicago?

How Much Do IT Services Cost in Chicago When it comes to the cost of hiring an IT Services company, there are hourly (break/fix) service agreements that would cost $120 to $280 … Read more
Read the Article

How Cybersecurity Companies Protect Business Email Accounts from Hacks

Business email accounts are mean big money to cybercriminals. Even a low-level employee has sensitive information including confidential documents, financial data, personal tax returns, banking information, passwords, and communication with other employees … Read more
Read the Article
in office 365, how do I stop admin accounts from being sent emails whenever an employee moves a file out of their junk folder

How to stop admin accounts from receiving alerts when employees move files out of their junk folder

In Microsoft 365, to prevent admin accounts from receiving emails or alerts when employees move a file out of their junk folder, you need to adjust your organizational settings. This might involve … Read more
Read the Article
History of IT Services Company

The History of IT Support Services

The History of IT Services: Technology Evolution Through the Decades Information technology (IT) changes rapidly and people who support it have evolved as well; IT has grown from large scale luxury to … Read more
Read the Article

How to Whitelist Domains in Google Workspace Admin Console

This is how to whitelist a domain in Google workspace console as an admin If you need a top managed services company to assist with this reach out LME Services Login to … Read more
Read the Article
Prepare for Tomorrow’s Tech

Future-Proofing Your IT: How to Prepare for Tomorrow’s Tech Today

The rapid pace of technological advancement is reshaping industries and rewriting the rules of business. Organizations that fail to anticipate and adapt to these changes risk falling behind. On the other hand, … Read more
Read the Article
Friendly IT Support Company

The Human Side of Cybersecurity: Why Friendly Support Matters for Your IT

In the world of cybersecurity, technology and tools are often front and center. Firewalls, antivirus software, and encryption protocols play crucial roles in protecting business data. However, there’s another key element that … Read more
Read the Article
Proactive IT Maintenance

Why Proactive IT Support, Because You Need IT

Proactive IT Looks Ahead While Reactive IT Looks Back Many businesses fall into the trap of “break-fix” reactive IT support because they see lower costs, but proactive IT support spend is so … Read more
Read the Article
Fixing IT Challenges

The Top IT Challenges Small and Mid-Sized Businesses Face—and How to Overcome Them

In today’s fast-paced digital world, IT systems play a crucial role in the success of small and mid-sized businesses (SMBs). However, managing technology effectively can be challenging without a dedicated, in-house IT … Read more
Read the Article
The deployment operation failed because the specified application needs to be registered

Windows 11 Photo Won’t Open Error – The deployment operation failed because the specified application needs to be registered

If your Windows 11 pictures won’t open with an error message that “the deployment operation failed because the specified application needs to be registered”, this is how to fix it If you … Read more
Read the Article
Why Small Businesses Need Cybersecurity

Why Small Businesses Need Cybersecurity Just as Much as Large Enterprises

When it comes to cybersecurity, there’s a common misconception that hackers only go after big enterprises with more data and deeper pockets. Unfortunately, the reality is that cyber criminals send out billions … Read more
Read the Article
is it safe to click remember me on website logins

Be Careful When You Choose “Remember Me” on Sensitive Websites

Be Careful When You Choose “Remember Me” on Sensitive Websites When you login to a website you will be presented with a convenient choice to “Remember me for XX days”, should you … Read more
Read the Article
network router IT consultants in schaumburg

Avoid The Risks Of An Un-Patched Router

If you or someone in your organization doesn’t regularly patch routers you are leaving a backdoor to your operations. Because your router is exposed to the internet, hackers can scan for your … Read more
Read the Article

Fully Managed IT Support vs. In-House IT: Which is Right for Your Business.

Defining Managed IT Services and In-House IT When it comes to managing your business’s IT infrastructure, two primary options are available: hiring an in-house IT team or outsourcing to a fully managed … Read more
Read the Article

The Role of Fully Managed IT Support in Business Continuity and Disaster Recovery.

Defining Business Continuity and Disaster Recovery In today’s fast-paced business environment, organizations must prioritize their resilience against disruptions, whether from natural disasters, cyberattacks, or operational failures. Two critical concepts that come into … Read more
Read the Article
managed IT services in Chicago

The Role of Managed IT Services in Chicago’s Growing Healthcare Industry

The Growing Healthcare Industry in Chicago Chicago’s healthcare industry is rapidly expanding, driven by advancements in medical technology, the rise of telehealth, and the increasing demand for efficient patient care. From hospitals … Read more
Read the Article
managed IT services Chicago

How Managed IT Services Support Chicago’s Remote and Hybrid Workforces

Introduction: The Rise of Remote and Hybrid Work in Chicago The shift toward remote and hybrid work has dramatically changed how businesses in Chicago operate. From tech startups to professional service firms, … Read more
Read the Article
cybersecurity services Chicago

Why Managed IT Services are Critical to Cybersecurity Success for Chicago’s Growing Tech Sector

Chicago’s tech sector is booming, attracting startups and established businesses alike. With this rapid growth comes an increased need for robust cybersecurity measures to protect sensitive data and intellectual property. Managed IT … Read more
Read the Article
cybersecurity services Chicago

How Chicago SMBs Can Leverage Cybersecurity Consulting to Protect Against Emerging Threats

Small and medium-sized businesses (SMBs) in Chicago face an ever-growing list of cybersecurity threats. From ransomware attacks to data breaches, the evolving digital landscape puts SMBs at risk. Cybersecurity consulting services offer … Read more
Read the Article
Fully Managed IT Support

Why Fully Managed IT Support is Essential for Scaling Your Business

As your business grows, so do its technology needs. Managing IT infrastructure, optimizing performance, and ensuring security become increasingly complex tasks. That’s where fully managed IT support comes in. For businesses looking … Read more
Read the Article
fully managed IT support

Fully Managed IT Support: A Proactive Approach to Cybersecurity

In today’s digital landscape, cybersecurity is a top priority for businesses of all sizes. With cyber threats growing in sophistication, it’s no longer enough to react to security breaches after they happen. … Read more
Read the Article
managed IT support near me

Top 10 Things To Look For When Hiring Managed IT Support

Finding the right managed IT support near me is essential for any business looking to protect its IT infrastructure, improve efficiency, and reduce operational downtime. With so many providers to choose from, … Read more
Read the Article
managed IT services Chicago

Managed IT Services: How to Get the Right Tech Support

In today’s fast-paced digital world, businesses of all sizes rely on technology to operate efficiently and securely. Whether you’re a startup or a well-established business, ensuring your IT infrastructure runs smoothly is … Read more
Read the Article

How to Set up a Password Manager for Your Law Firm

When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious program … Read more
Read the Article

The LME Services Origin Story

Every great company has an origin story and as LME celebrates 30 years in the IT and cybersecurity industry, we sat down with CEO Joe Engelking and founder Leon Engelking to share … Read more
Read the Article

What happened with the Crowdstrike Outage

WTF happened with the CrowdStrike Outage First Off, who (or what) is CrowdStrike? Similar to Norton, Symantec, or McAfee – CrowdStrike is a cybersecurity company that provides endpoint protection, threat intelligence, and … Read more
Read the Article

How to Increase the Delivery Rate of Your Emails Sent to Gmail

In February, Gmail greatly tightened its spam monitoring which has greatly affected email delivery to gmail accounts.  Here is how to increase the delivery rate of your emails to Gmail or Google … Read more
Read the Article

How to Easily Find Diagnose if a File or Website Is a Virus

Here is a free service to easily find out if a file or website is dangerous With the preponderance of new e-mail scams coming out each month, it is ever more important … Read more
Read the Article

Outlook “Keep Your Account Secure” Error Fix

Fix Outlook Error – Keep Your Account Secure – Update Browser   Here is how to fix the Office 365 Outlook account will pop up error message stating that to keep your … Read more
Read the Article

Don’s I.T. Story

Don’s I.T. Story May Sound Familiar   Don Gould originally reached out because his law firm wanted to get away from the solo I.T. Consultant that had been dealing with for 8 … Read more
Read the Article

How to Set up a Password Manager for Your Startup Business

  When cyber security consultants address the security concerns of a startup business, we want to work off of what happens when a computer gets breached either because of installing a malicious … Read more
Read the Article

How to Set up a Password Manager for Your Law Firm

  When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious … Read more
Read the Article

Step by Step Guide to Create a Reoccuring Teams Webinar

Welcome to our step-by-step guide on how to create a recurring Teams webinar Start by opening Microsoft Teams (Work or School) on your computer On the left-hand side select CALENDAR Now Select … Read more
Read the Article

How to Stop Chrome From Asking to Store Passwords

  There are many reasons to stop Chrome from asking to store passwords, as a cybersecurity services company we believe you should use a secure password managed because these passwords can easily … Read more
Read the Article

Why Do Hybrid Work Environments Need Cybersecurity

  With a hybrid work environment, where employees work both remotely and in an office, you will need to rethink the risks associated with employees taking their work home: 1. **Increased Attack … Read more
Read the Article

How to Stop Shared Mailbox from Showing up in Outlook for Microsoft 365

  If you have access to a shared mailbox in Office 365, by default the mailbox will show up in your Outlook account.  This is how to stop a shared mailbox from … Read more
Read the Article

Wrong Email Address in the to Line

  If you have an issue where the TO field on your phone is showing the wrong display name or email address then it is typically a Contact Card issue. To fix … Read more
Read the Article

How to Easily Perform an on-Prem Exchange Server to Office 365 Email Migration

  After having performed dozens of on-premise Exchange to Office 365 Hosted exchange migrations, the path of least resistance for these email migrations is to use a combination of tool. Microsoft Office … Read more
Read the Article

How to Pause Azure AD Connect Sync

To pause Microsoft Office 365 Entra or Azure AD Connect, you will need to run a Powershell command because simply disabling services will not work. If you need a managed IT services company to … Read more
Read the Article

The History of Cyber Security

The history of cyber attacks dates back to the early days of computer technology.   Throughout this history, cyber attacks have become more complex, diverse, and damaging. The motivations behind attacks have … Read more
Read the Article

How Has Ransomware and Cyber Attacks Evolved

Ransomware and cyber attacks have evolved significantly over the years, with attackers adopting more sophisticated techniques and strategies. Here are some key trends in the evolution of ransomware and cyber attacks: The … Read more
Read the Article

Scammers Are Now Using AI to Impersonate Family Members

  Scammers have started using artificial intelligence (AI) in various ways to carry out more sophisticated and convincing scams.  A new AI scam going around is targeting the elderly.  The scammer will … Read more
Read the Article

How to Increase Email Security

How LME Greatly Reduces Your Risk to Email Hacks                
Read the Article

Cyber Security Best Practices for Illinois Law Firms

Securing Your Law Firm: Cyber Security Best Practices for Illinois-Based Firms   No matter what type of business you run, the world of digital technology has become an essential part of everyday … Read more
Read the Article

How to Fix ELO POS Not Printing

How to Fix ELO Touchscreen Point of Sale System Not Printing   We have found that ELO touchscreens with built-in Star printers or Zebra printers will stop printing for seemingly no reason, … Read more
Read the Article

HP Printer Runs out of Ink Extremely Fast

Does your HP Laserjet, Canon, Epson or Ricoh Printer run out of ink way too fast? A lot of times the print quality is what chews up so much ink.  DPI (Dots … Read more
Read the Article

Fix ‘Your Sign-in Settings Don’t Meet Your Organizations 2-Step Verification Policy’

Fix Google Gmail Error – Your Sign-in Settings Don’t Meet Your Organizations 2-Step Verification Policy When Mandatory 2FA is turned on in Google Workspace, you may run into an issue where gmail … Read more
Read the Article

LME Services Recognized by GoodFirms

LME Services Recognized by GoodFirms as the Best Company to Work With Digital transformation and automation are revolutionizing the world. Adopting digital solutions is critical for businesses as it enables them to … Read more
Read the Article

What Is ChatGPT

What is so special about ChatGPT   ChatGPT is a free-to-use A.I. chatbot (artificial intelligence tool) that lets you have Q&A interactions with a chatbot that most in the world would mistake … Read more
Read the Article

Cant Sync Office 365 Sharepoint Site Library

  Is your Sharepoint online site SYNC button greyed out or completely missing, well here is the fix First, make sure you have permission to access the site, if you can see … Read more
Read the Article

Office 365 Backup Consultants

  Do you have Office 365 and worry about it being properly backed up and monitored?  There are loads of backup solutions, services, and recovery services but which one is the best, … Read more
Read the Article

Join Our MSP Referral Program – Send a Referral to an MSP and Get PAID

  LME Services is looking to grow and we would love your help. We are looking at taking on clients anywhere in the United States so introduce us and if we close … Read more
Read the Article

New Windows Computer Won’t Sign in with Office 365 Email Credentials

  Is your Office 365 ID not working on your NEW Windows 10 or Windows 11 Computer?  Whelp, that’s because it’s not asking for your Microsoft 365 work credentials it’s asking for … Read more
Read the Article

LME Services Is Now Listed Amongst Upcity’s Top Managed IT Services Providers!

LME Services is thrilled to announce that we are officially a part of the UpCity community of Chicago’s managed IT services providers!   LME Services is a mid-sized IT services company that … Read more
Read the Article

What a Google User Sees When You Enable 2FA in Google Workspace

  Turning on 2-factor authentication for Google Workspace, or any email account, should be mandatory for all email accounts but especially for work email accounts like Google Workspace as studies have shown … Read more
Read the Article

How IT Services Can Help Businesses Succeed

Technology has become so deeply embedded in our lives that it is hard to imagine a world without it. This is especially true for businesses, which rely on technology to keep their … Read more
Read the Article

What Is an IT Services Continuity Plan and How Does It Benefit Businesses?

An IT services continuity plan is a strategy that outlines the steps needed to keep an organization’s IT services running during any disruption or disaster. This type of plan helps organizations recover … Read more
Read the Article

Exploring the Difference between Computer Science and Information Technology

  If you’re interested in a career in tech, you may be wondering what the difference is between computer science and information technology. While they are both fields related to computers, they … Read more
Read the Article

How to Fix When Wifi Stops Working on Lenovo or Dell Laptop

  When the wireless on your laptop stops working either because it connects and the internet doesn’t work or because you get a cannot connect error, the answer is often updates and … Read more
Read the Article

New Email Scam

  The latest email scam looks like this:   Good afternoon, Please take a look at the attached document ASAP. And have a nice day.   The email has an attachment that … Read more
Read the Article

Cloud Data Migration

How We Plan a Cloud Data Migration   Proper data migrations involve 4 basic steps:     Moving important or sensitive data and decommissioning legacy systems can put stakeholders on edge. Having … Read more
Read the Article

How to Move Your Servers to the Cloud

We capture the physical server   Make the container accessible from the target server     Part 3: Deploy from the container into the Cloud   After the migration:   Once the … Read more
Read the Article

What Are the Pros and Cons of Moving to SharePoint Online

  SharePoint Online is a file repository service provided by Microsoft’s Office 365 platform.  So the question everyone has is, is it a good replacement for a Windows File Server and should … Read more
Read the Article

Fix OneDrive & SharePoint Sync Error

Fix OneDrive Error – Your IT Admin Doesn’t Allow Syncing of SharePoint Folder / Library   Users can now Sync SharePoint folders via OneDrive rather than the clunky option of opening SharePoint … Read more
Read the Article

How to Ensure Your Data Never Disappears

Our disaster recovery plan goes something like this “HELP, HELP!” – Dilbert   If your server/cloud/laptop/PC were to suddenly crash and be devoid of all the work and information you have stored … Read more
Read the Article

An MSP Break-up Guidebook

  Transitioning to a new managed service provider may seem like a daunting process, but it doesn’t have to be. Lawyers are sometimes involved but often the transfer process is cut and … Read more
Read the Article

Can’t Set up Office 365 on Outlook

  If you have two-factor authentication and you get this message when trying to set up your office 365 email account within outlook then here is the fix (it is likely a … Read more
Read the Article

How to Create Office 365 Rule to Turn off Spam Filtering

Often times it’s easier to just turn off Spam Filtering than it is to ask users to keep adding people to Whitelists, so this is how you can create an Office 365 … Read more
Read the Article

Create Office 365 Rule to Allow Only Email from Specific Smart Host or IP Addresses

Here is how to tighten up email delivery so that only approved senders, like smarthosts, can send email to your Office 365 accounts Microsoft Exchange servers had a provision to allow only … Read more
Read the Article
it services for CPA and accountants

How to Stop Your Office 365 and Google Workspace Email Accounts from Getting Hacked

  Getting one of your business email accounts hacked CAN AND WILL HAPPEN without proper procedures in place and once that email account gets hacked it can balloon into wire transfer fraud, … Read more
Read the Article

Email Audit and Office 365 Search Experts

Law Firms, Accounting Firms & Legal Email Audits – LME Services Can Easily Find and Export All Relevant Office 365 Emails for You   29th Street Capital – Real Estate Investors – … Read more
Read the Article

How to Setup Remote Access to Your Office for FREE during Covid Coronavirus Pandemic

  There are many choices when it comes to setting up secure remote access for your business and employees so let’s cover your options and the PROS and CONS of things likes … Read more
Read the Article

How to Protect against Remote Desktop Hacking

  Like most cybersecurity topics, there is no way to 100% stop remote desktop hacking but we can make it very difficult I have heard from other techs that you should never … Read more
Read the Article

LME’s IT Services Commended for Superior Customer Sastisfaction

  Did you know that in the last decade United States based outsourced IT services has exponentially increased? With LME just a call away, you can access us and our expertise whenever … Read more
Read the Article

How to Stop Office 365 From Sending Winmail.dat

Winmail.dat is a file that gets created when email clients, usually Apple products like iPhones and MacBooks, can’t interpret the format of an email If you want a great Office 365 consultant … Read more
Read the Article

Law Firm Transition to MSP Case Study

CASE STUDY – Transitioning from 3rd Party Break/Fix Support to LME Managed Services   Hansen and Cleary – Law Firm – MSP Transition Case Study   Hansen and Cleary, special education and … Read more
Read the Article

Start a Service Business with No Risk – Page 1a

Figure out Who You Are, Figure out Who They Are, Figure out How to Honestly Speak to Them   Jon opens up google and types in ‘IT Services near me’ to see … Read more
Read the Article

What Does Windows 7 End of Life Mean for Your Business

What does Windows 7 End of Life Mean for your Business   The end of the Windows 7 lifecycle is set for January 2020, which means that Microsoft is discontinuing all support, security … Read more
Read the Article

Stop Hackers from Remotely Accessing Your Computer via RDP

 Here is how to secure your Remote Desktop services and stop hackers from attempting to brute force passwords to your work computers If you’re not worried about hackers remotely accessing your computers … Read more
Read the Article

How to Easily Send Self-Destructing Emails

  If your feeling a bit like Chief Quimby in Inspector Gadget and would like your emails to self destruct after you’ve delivered them that we’ve got just the tools.   If … Read more
Read the Article

Disable Spam and Junk Filtering for All Users in Office 365 Using PowerShell with MFA Enabled

Here is how to turn off junk and spam filtering in Office 365 for all users You have to use PowerShell, and it takes a specific set of tools and commands that … Read more
Read the Article

Cyber Security Plan

I Woke up and Everything Was Gone   Joe woke up to the buzzing of his phone and a hundred texts.  “Everything is gone” Their CRM database was corrupted.  His domain controller … Read more
Read the Article

Add Dropbox Functionality to Your Windows Server

  For years, people have wanted to add dropbox functionality to their windows servers so that they can easily access their server files while out of the office but businesses were stuck … Read more
Read the Article

LME Services Recognized as a Chicago Leader by Clutch

  Open since 1994, LME Services is a Chicago-based, family-run IT services company. Low overhead combined with our unique IT support delivery strategy means that we are able to provide clients an … Read more
Read the Article

SEO Case Study

SEO CASE STUDY – California Law Firm SEO Implementation   Law Office of Alexandra R. McIntosh – Lawyer   Alexandra McIntosh, a San Diego County based Law Firm, had the goal of … Read more
Read the Article

Google Plus Hacked

Google Plus Was Hacked And… No One Cares   Breaking news came out of Silicon Valley this week when Google announced that a major security flaw had exposed the data of nearly … Read more
Read the Article
How to Hack WiFi Passwords in 3 Easy Steps

How to Hack WiFi Passwords in 3 Easy Steps

How to Hack a Wifi Network Want to learn how to hack a WiFi password or, in our case, protect yourself from WiFi hacking then here are the steps hackers use to crack … Read more
Read the Article

Dell OptiPlex Won’t Boot after SSD Clone of Windows 10

  I recently had an issue where I had used Acronis clone to image Windows 10 from a SATA HDD over to SanDisk SSD and after the cloning the Dell OptiPlex 3040 … Read more
Read the Article

LifeLock Unlocked by Security Flaw

  Identity theft protection firm LifeLock recently fixed a vulnerability on its site that exposed their customer’s email addresses to anyone with a basic understanding of how to use a web browser. Lifelock, more … Read more
Read the Article
Create App Password

How to Connect to Office 365 Email with a New Device When Multi-Factor Authentication Is Turned On

  The important item to note is that when Multi-Factor Authentication is turned on, your regular Office 365 password will not work when you attempt to add (or resume using) your computer, … Read more
Read the Article

How to Get 200 Daily Visitors to Your Website

How LME’s Website Got to 200 Daily Visitors and Yours Can Too   When I took over our website we had zero visitors. It had our company name a picture of our … Read more
Read the Article
network router IT consultants in schaumburg

Texas Cancer Center Ordered to Pay $4.3 Million Fine for HIPAA Violation

  The U.S. Department of Health and Human Services ruled that The University of Texas MD Anderson Cancer Center violated the HIPAA Act and was ordered to pay $4.3 million to the … Read more
Read the Article

Why Is Gmail Treating My Exchange Server’s Domain Emails as Spam

Here is how to fix when Gmail or Microsoft 365 are treating your work domain emails like spam You are likely going into spam because your email domain’s hosted DNS records, specifically … Read more
Read the Article

The Easy and Free Way to Record and Send an Error Message

  People that have tech issues often forget why an error occurred when they explain it to us later (or things will work without issue when they try to show us). All … Read more
Read the Article

Why You Need to Turn on 2 Factor Authentication

  You need to turn on 2 Factor Authentication pronto because its the only way to A) know if someone is trying to get in and B) if someone has your password. … Read more
Read the Article

How to Choose an IT Managed Services Provider

  To begin understanding how to choose an IT Managed Services Provider, you need to understand what the heck an MSP is in the first place. Simply put, an MSP is an … Read more
Read the Article
is it safe to click remember me on website logins

CASE STUDY – Transitioning from Break/Fix Support to Managed Services

  Prairie Contractors, Inc. – General Contractor   Prairie Contactors, a general contractor and construction services company, had the goal of transitioning their IT Services and Tech Management away from break/fix hourly IT … Read more
Read the Article
Top MSP Consulting Companies in Chicago

LME Among Top Managed Services Providers

  Clutch, an independent market research firm based in Washington DC recently released of the list of the top IT services firms in the Chicago area, and LME Services is proud to … Read more
Read the Article

Why Your Bad I.T. Guy Will Kill Your Business

  Warning: The ineptitude of the I.T. Guy and the businesses network I am about to recount may be unsuitable for children or people with queasy stomachs. I’m Joe (hello joe) and … Read more
Read the Article

The Facebook Data Leak Explained – (in a Nutshell, It Was FB Doing Business as Usual)

  Facebook has been in the headline a lot lately, and for all the wrong reasons.  This time around FB is getting tangled in a whole mess of culpability gray areas that … Read more
Read the Article

How Do Computers Work, a Short Answer

 How do computers work? This short article is designed to give you a layman’s view on how computers take electricity and turn that into computer games, word processing, sound and complex applications … Read more
Read the Article

What Are the Pros and Cons of Getting a Firewall

  Before discussing what the pros and cons of getting a firewall are let’s quickly explain what a firewall is.   What is a network firewall after all?   A firewall is … Read more
Read the Article
setup teamviewer VPN to office computer

How Setup a VPN to Your Office for FREE Using Teamviewer

To Setup a VPN to your Office for FREE using Teamviewer between your home and office computers you will need to download and install TeamViewer on both your home computer and your … Read more
Read the Article
backup exec email notifications not working

How to Fix When Backup Exec Email Notifications Fail

How to fix when a Backup Exec email notifications will not send to outside email addresses We had already created a receive connector in Exchange for our copiers, scanners, etc., and had … Read more
Read the Article

Pros and Cons of an Office 365 Hybrid Migration

  If your planning on moving to Microsoft Office 365 then you’re in the right place because today you will learn what an Office 365 migration is, what the Pros and Cons … Read more
Read the Article
MBAM Console - Failed to open service control manager Error Code 5 FIX

MBAM Console – Failed to Open Service Control Manager Db Error Code 5 FIX

 Here is how to fix Malwarebytes Console DB rrror Code 5 When doing a remote client push from the Malwarebytes Management Console I received the error ” Installation failed. Failed to open … Read more
Read the Article

Get Alerted When Internet Speeds Drop

If you want to get alerts when your internet speeds slow down, here is a nice way to get notified.  You can be sure the ISP’s aren’t going to tell you there … Read more
Read the Article

Have LME Services Perform a Network Audit

Getting a network audit performed is a key component to any secure business.  With the prevalence of malware, viruses, backdoors and spear phishing techniques it is vital for business managers to not … Read more
Read the Article
godaddy bought my searched domain name

Does GoDaddy and Network Solutions Buy Searched Domains

Do GoDaddy and Network Solutions buy searched domains? Why yes, diligent tech investigators, they certainly do.  Seems kind of scummy, doesn’t it?  Yep, it sure does. Now, GoDaddy and Network Solutions will … Read more
Read the Article

How Bad Was the CCleaner Hack… It’s Equifax Bad

How Bad was the CCleaner Hack? So bad that most security experts recommend that you completely remove and reinstall Windows if you had the afflicted CCleaner version installed What is CCleaner? CCLeaner … Read more
Read the Article

What Happend with the Equifax Hack in Layman’s Terms

By now you have probably already learned about the massive data hording giant that is Equifax.  Whether you volunteer your information to them or not, Equifax is doing its best to aggregate … Read more
Read the Article
accounting firm it services company

How to Search for Web Pages Based on Their Creation Date

  Every typed in a search term on Google and wondered how to search for web pages based on their creation date? If I’m searching for “the best website of 2017” and … Read more
Read the Article
do I have a bad IT guy

Is Your Linksys or D-Link Router Safe and Secure?

  Wait, what is the CIA doing with my home router? According to documents released by WikiLeaks, home routers from 10 major manufacturers including Linksys, DLink and Belkin can be turned into … Read more
Read the Article

Get a Simple Cloud Backup Solution for Your Computer

  Get a Simple Cloud Backup Solution for Your Computer Do you have YEARS’ worth of Holidays, Family Vacations and Personal Photo’s sitting on a LONE computer? Do you have work files … Read more
Read the Article

How to Change Your Internet Browser Home Page

  Different people like different home pages greeting them when they open up their browsers so today you will learn how to change your home page in Google Chrome, Internet Explorer, Edge … Read more
Read the Article
what is about blank webpage

What Is the about:Blank Page in My Web Browser Used For

  While most people prefer to use a specific webpage as the home page in their web browser, others like the idea of having pages load blank instead, or they simply had … Read more
Read the Article

WannaCry Ransomware Virus Explained

  What is the WannaCry Ransomware Virus? Simply put, the Wannacry virus is just another in a series of Ransomware viruses that encrypts your data and files and makes them inaccessible unless … Read more
Read the Article

How to Fix When You Can’t Install Windows OS from Bootable USB Drive

  Here is how to fix when Windows won’t install from a bootable USB drive. If you need a managed IT services company to help install an operating system or troubleshoot any installation issues … Read more
Read the Article

Google Docs Phishing Email Scam Explained

What Happened? A particularity clever Google Docs Zero Day flaw was exposed via a widespread phishing scam yesterday. The email masks itself as a user trying to share a Google Doc with … Read more
Read the Article

What Does Chrome’s Incognito Browsing Mode Do?

What does the Chrome incognito tab do? The chrome incognito tab is basically a simple way of telling Google Chrome to not save a LOCAL record of the websites you visit. Most … Read more
Read the Article

Ransomware Stopper

The LME Ransomware Stopper That Is So Simple Anyone Can Use It   What Does It Do: How Does It Work: Why Has No One Else Done This:   Mention this Post … Read more
Read the Article

How to Lock down Folder and File Creation on a Root Folder

Want to know how to lock down folder and file creation on a root folder? No?  Well then why the hell are you here? Oh…. You said no doubt… Well good, cause … Read more
Read the Article

How to Run Add Remove Programs in Safe Mode

This is how to add or remove programs in safe mode To be able to run add remove programs in safe mode you need to: Copy these commands into the text file … Read more
Read the Article

Create a Web URL Desktop Shortcut That Opens in Internet Explorer IE

I needed to Create a Web URL Desktop Shortcut that Opens in Internet Explorer IE via Group Policy because a client has an internal Web Application that only works within IE. Outside … Read more
Read the Article
Managed IT Support in Illinois

How to Setup Remote Access to Your Office for FREE

 Here is how to setup Free Remote Access to your Office computer There are oodles of ways to remote access to your Office network for FREE, you can use a remote connection … Read more
Read the Article

Hyper-v Guest OS Network Adapter Not Working Fix

Here is how to fix when a Hyper-V Guest OS Network Adapter is not working We implement a lot of Hyper-V servers because Hyper-V is free, simple, and easy (well, easy enough at … Read more
Read the Article
hidden internet browsing

The Web Browser That Will Hide You from EVERYONE

Tor is a free web browser created by the US Naval Research laboratory with goal of creating anonymous web communication. Basically, they wanted to create a Web Browser that will hide you from EVERYONE … Read more
Read the Article

How to Setup Scan to SMB Desktop on a Mac

Here are the steps to setup scanning on your Mac computer  If you need a top managed IT services company to help setup scanning on your Apple computer then give LME a call How … Read more
Read the Article
importance of encryption

This Is Why Encryption Is so Important

  Let’s face it, computers, phones, and tablets are hackable.  Microsoft, Apple, and Google all have Zero Days (fatal security flaws) that talented hackers and state-sponsored organizations can use to get anything … Read more
Read the Article
Managed IT support for lawyers

Cant Add Youtube End Screen Element Because at Least One Element Must Be a Video or Playlist Fix

I couldn’t add a Youtube end screen annotation to link to my website https://www.lmeservices.com and after finding nothing on the interwebs I figured out that the cant add end screen element is … Read more
Read the Article

How to Connect Outlook to Office 365 in a Windows Domain

  You would think that connecting a Microsoft Product (outlook 2010) to another Microsoft product (office 365) while on a Microsoft Domain would be simple, but its not. So if you have … Read more
Read the Article
checking for updates

Checking for Windows Update Fix

  If you’ve installed a fresh copy of Windows 7, Windows 8 or Windows 10 and noticed that either the updates are not coming through or that it is stuck on “checking … Read more
Read the Article
cybersecurity for small businesses

The 7 Steps to Modernize Your Business

Get the EBook Get the EBook Don’t Get the EBook
Read the Article
what are push notifications

What Are These Push Notifications?

How are companies able to push notifications to my computer? The service that allows us to send notifications to you is called Push Notifications.  Push notifications are a feature built into mobile … Read more
Read the Article
fix outlook 2016 2013 2010 eas error

How to Fix the Log onto Office 365 & Exchange ActiveSync EAS Outlook error – Something Went Wrong

  Typically we see the “Cannot Log onto Exchange ActiveSync mail server (EAS) The server cannot be found” issue when Outlook is trying to connect to an Exchange server or the ‘Something Went … Read more
Read the Article

What the Heck Is Bitcoin?

You have probably at some point in your internet browsing history come across an article or website referencing “Bitcoin”.  You may have even noticed that a lot of legitimate companies are accepting … Read more
Read the Article

The 6 Tech Habits of High Performing SMBs

According to the Bureau of Labor Statistics, about 50% of small businesses fail in the first four years. Our economy is driven by small and private businesses which makes it a highly competitive marketplace, … Read more
Read the Article
down server alerting

Get Instant Alerts if Your Business Servers or Business Internet Go Down

How to Get Alerts When Your Internet Goes Down   If you want to get instantly alerted when your business internet goes down, we have a simple solution for you If you’re … Read more
Read the Article
program that stops ransomware

The Program That Will Stop Ransomware and Employee Theft in Its Tracks

  Data theft is a common occurrence and is something that is only getting more complex and prevalent but is getting harder and harder to stop.  What we have recognized is that … Read more
Read the Article

Review Your IT Consultants Proposals (AKA, Is My It Guy Ripping Me Off)

  I’ve seen enough contracts from IT companies previously used by clients to know that people get ripped off all the time, so I simply want to give you the ability to … Read more
Read the Article

Fix Konica Scan to Email Office 365 Issue

  If you need to know how to setup scan to email on a Canon, Toshiba, Xerox, and Konica Minolta then you will want to use Office 365 Direct Send (as long … Read more
Read the Article
experienced it consultants

How to Diagnose and Fix the Dreaded BSOD

  Most, if not all, Windows users will have to Diagnose and Fix the Blue Screen of Death (or BSOD) at some point in their life, here is how to do this. … Read more
Read the Article
windows 10 it consultants

How to Reclaim Your Privacy from Windows 10

  “We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good … Read more
Read the Article
windows 10 lme services

Windows 10 RRAS VPN Wont Connect – Fix

  I recently upgraded to Windows 10 and came across an issue where Windows 10 VPN would not connect to my Windows RRAS Server. While setting up the VPN to connect to … Read more
Read the Article

iPhone Connects to Microsoft Exchange Server but Email Wont Sync

  Here is a fix for situations where Android or iPhones will connect to a Microsoft Exchange Server but email won’t sync I have encountered the sync error when using Microsoft Exchange … Read more
Read the Article
How to Export your Autocomplete list and import it into MailChimp

How to Export Your Autocomplete Contact List from Outlook and Import Email Addresses into MailChimp

  A newsletter is a powerful marketing tool that can benefit by having as many email addresses in it as possible – so here is how to easily export your autocomplete list … Read more
Read the Article

How to Record Your Computer Screen

There are many times when it would be very beneficial to record what you are doing on your computer so you can easily share it for training or to remind yourself how to … Read more
Read the Article
google drive it consultants

How to Share Google Drive Files through a URL Link

  Google Drive has very limited options when you share or reference files as URL paths, so here is how to share Google Drive files as a URL or Link In our … Read more
Read the Article
best it consulting

Locky Virus Spreads through Word Macros

A cryptolocker variant, the locky virus, has found a new way to infect your computer through the process of Word document Macros. The infected Work document will request that you enable macros in Word and … Read more
Read the Article
diffie-hellman

Weak Ephemeral Diffie-Hellman Public Key

If your getting the “Server has a weak ephemeral Diffie-Hellman public key” error its because your trying to access an unsecured webpage.  Unfortunately the internet and local intranets are riddled with these … Read more
Read the Article
ss it consultants

Why You Need an SSD

If you follow computer technology than you’ve probably heard that Solid State Hard Drives (or SSDs) are the single best upgrade you can add to your computer.  But what is an SSD … Read more
Read the Article

15 Most Useful Keyboard Shortcuts

Since we like to preach working faster and smarter we thought we would provide a list of the 15 most useful keyboard shortcuts in Windows.  I want you to think about something … Read more
Read the Article

AWARD-WINNING CYBERSECURITY AND I.T. SERVICES

Managed IT Services
System Audits/Assessments
Design & Installation
Software Implementation
Custom Software Development
Remote Monitoring
24/7 Maintenance & Support
Cybersecurity Services
ISO Consulting
SOC Consulting
HIPAA Consulting
Systems Monitoring
Policy Development
Fraud Prevention
Data Protection