LME Services IT Blog

Start a Support Session
LME Services Remote Access Download Download the support tool so LME can access your computer When you want to end the support session, be sure to quit the program. This ensures your … Read more

Write for US – IT Services, Technology, IT Support Guest Blog Posting
We at LME Services are excited to invite skilled writers and IT professionals to contribute to our platform. If you have a passion for information technology, problem-solving, creating insightful content, or have … Read more

Why Cyber Insurance is No Longer Optional: Protecting Your Business in the Digital Age
Why Cyber Insurance is No Longer Optional: Protecting Your Business in the Digital Age As any IT consulting firm can tell you, cyberattacks can bring devastation to a business. One breach, one … Read more

Want to Sell Your Break-Fix IT Consulting Company? I’ll Buy IT!
Sell Your Break-Fix IT Consulting Company to LME Services If you’re an independent IT consultant or run a break-fix IT company, you’ve probably spent years building relationships, solving problems, and keeping your … Read more

Create a SharePoint portal for file uploads
How to Create a SharePoint Portal for Visitors to Upload Files Here are the steps to create a secure SharePoint portal that allows guests to upload files that only they can see … Read more

The Top Reviewed IT Service Companies in Chicago 2025
Here is an updated list of the top 10 IT services companies in Chicago, now including their updated Google review ratings If you are in the market for IT Services in Chicago, … Read more

How to Transfer Microsoft Authenticator Account to New Phone
How to Transfer Microsoft Authenticator Account to New iPhone or Android If you get a new phone and need to transfer over all your 2FA codes to a new phone you will … Read more

How to Grant Access to a User’s OneDrive Files
How to Give OneDrive Access to Another User From the Office 365 Admin Center Here is a step by step guide on how to give an employee access to another employee’s OneDrive … Read more

How Much Do IT Services Cost in Chicago?
How Much Do IT Services Cost in Chicago When it comes to the cost of hiring an IT Services company, there are hourly (break/fix) service agreements that would cost $120 to $280 … Read more

How Cybersecurity Companies Protect Business Email Accounts from Hacks
Business email accounts are mean big money to cybercriminals. Even a low-level employee has sensitive information including confidential documents, financial data, personal tax returns, banking information, passwords, and communication with other employees … Read more

How to stop admin accounts from receiving alerts when employees move files out of their junk folder
In Microsoft 365, to prevent admin accounts from receiving emails or alerts when employees move a file out of their junk folder, you need to adjust your organizational settings. This might involve … Read more

The History of IT Support Services
The History of IT Services: Technology Evolution Through the Decades Information technology (IT) changes rapidly and people who support it have evolved as well; IT has grown from large scale luxury to … Read more

How to Whitelist Domains in Google Workspace Admin Console
This is how to whitelist a domain in Google workspace console as an admin If you need a top managed services company to assist with this reach out LME Services Login to … Read more

Future-Proofing Your IT: How to Prepare for Tomorrow’s Tech Today
The rapid pace of technological advancement is reshaping industries and rewriting the rules of business. Organizations that fail to anticipate and adapt to these changes risk falling behind. On the other hand, … Read more

The Human Side of Cybersecurity: Why Friendly Support Matters for Your IT
In the world of cybersecurity, technology and tools are often front and center. Firewalls, antivirus software, and encryption protocols play crucial roles in protecting business data. However, there’s another key element that … Read more

Why Proactive IT Support, Because You Need IT
Proactive IT Looks Ahead While Reactive IT Looks Back Many businesses fall into the trap of “break-fix” reactive IT support because they see lower costs, but proactive IT support spend is so … Read more

The Top IT Challenges Small and Mid-Sized Businesses Face—and How to Overcome Them
In today’s fast-paced digital world, IT systems play a crucial role in the success of small and mid-sized businesses (SMBs). However, managing technology effectively can be challenging without a dedicated, in-house IT … Read more

Windows 11 Photo Won’t Open Error – The deployment operation failed because the specified application needs to be registered
If your Windows 11 pictures won’t open with an error message that “the deployment operation failed because the specified application needs to be registered”, this is how to fix it If you … Read more

Why Small Businesses Need Cybersecurity Just as Much as Large Enterprises
When it comes to cybersecurity, there’s a common misconception that hackers only go after big enterprises with more data and deeper pockets. Unfortunately, the reality is that cyber criminals send out billions … Read more

Be Careful When You Choose “Remember Me” on Sensitive Websites
Be Careful When You Choose “Remember Me” on Sensitive Websites When you login to a website you will be presented with a convenient choice to “Remember me for XX days”, should you … Read more

Avoid The Risks Of An Un-Patched Router
If you or someone in your organization doesn’t regularly patch routers you are leaving a backdoor to your operations. Because your router is exposed to the internet, hackers can scan for your … Read more

Fully Managed IT Support vs. In-House IT: Which is Right for Your Business.
Defining Managed IT Services and In-House IT When it comes to managing your business’s IT infrastructure, two primary options are available: hiring an in-house IT team or outsourcing to a fully managed … Read more

The Role of Fully Managed IT Support in Business Continuity and Disaster Recovery.
Defining Business Continuity and Disaster Recovery In today’s fast-paced business environment, organizations must prioritize their resilience against disruptions, whether from natural disasters, cyberattacks, or operational failures. Two critical concepts that come into … Read more

The Role of Managed IT Services in Chicago’s Growing Healthcare Industry
The Growing Healthcare Industry in Chicago Chicago’s healthcare industry is rapidly expanding, driven by advancements in medical technology, the rise of telehealth, and the increasing demand for efficient patient care. From hospitals … Read more

How Managed IT Services Support Chicago’s Remote and Hybrid Workforces
Introduction: The Rise of Remote and Hybrid Work in Chicago The shift toward remote and hybrid work has dramatically changed how businesses in Chicago operate. From tech startups to professional service firms, … Read more

Why Managed IT Services are Critical to Cybersecurity Success for Chicago’s Growing Tech Sector
Chicago’s tech sector is booming, attracting startups and established businesses alike. With this rapid growth comes an increased need for robust cybersecurity measures to protect sensitive data and intellectual property. Managed IT … Read more

How Chicago SMBs Can Leverage Cybersecurity Consulting to Protect Against Emerging Threats
Small and medium-sized businesses (SMBs) in Chicago face an ever-growing list of cybersecurity threats. From ransomware attacks to data breaches, the evolving digital landscape puts SMBs at risk. Cybersecurity consulting services offer … Read more

Why Fully Managed IT Support is Essential for Scaling Your Business
As your business grows, so do its technology needs. Managing IT infrastructure, optimizing performance, and ensuring security become increasingly complex tasks. That’s where fully managed IT support comes in. For businesses looking … Read more

Fully Managed IT Support: A Proactive Approach to Cybersecurity
In today’s digital landscape, cybersecurity is a top priority for businesses of all sizes. With cyber threats growing in sophistication, it’s no longer enough to react to security breaches after they happen. … Read more

Top 10 Things To Look For When Hiring Managed IT Support
Finding the right managed IT support near me is essential for any business looking to protect its IT infrastructure, improve efficiency, and reduce operational downtime. With so many providers to choose from, … Read more

Managed IT Services: How to Get the Right Tech Support
In today’s fast-paced digital world, businesses of all sizes rely on technology to operate efficiently and securely. Whether you’re a startup or a well-established business, ensuring your IT infrastructure runs smoothly is … Read more
How to Set up a Password Manager for Your Law Firm
When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious program … Read more

The LME Services Origin Story
Every great company has an origin story and as LME celebrates 30 years in the IT and cybersecurity industry, we sat down with CEO Joe Engelking and founder Leon Engelking to share … Read more

What happened with the Crowdstrike Outage
WTF happened with the CrowdStrike Outage First Off, who (or what) is CrowdStrike? Similar to Norton, Symantec, or McAfee – CrowdStrike is a cybersecurity company that provides endpoint protection, threat intelligence, and … Read more

How to Increase the Delivery Rate of Your Emails Sent to Gmail
In February, Gmail greatly tightened its spam monitoring which has greatly affected email delivery to gmail accounts. Here is how to increase the delivery rate of your emails to Gmail or Google … Read more

How to Easily Find Diagnose if a File or Website Is a Virus
Here is a free service to easily find out if a file or website is dangerous With the preponderance of new e-mail scams coming out each month, it is ever more important … Read more

Outlook “Keep Your Account Secure” Error Fix
Fix Outlook Error – Keep Your Account Secure – Update Browser Here is how to fix the Office 365 Outlook account will pop up error message stating that to keep your … Read more

Don’s I.T. Story
Don’s I.T. Story May Sound Familiar Don Gould originally reached out because his law firm wanted to get away from the solo I.T. Consultant that had been dealing with for 8 … Read more

How to Set up a Password Manager for Your Startup Business
When cyber security consultants address the security concerns of a startup business, we want to work off of what happens when a computer gets breached either because of installing a malicious … Read more

How to Set up a Password Manager for Your Law Firm
When cyber security consultants address the security concerns of a law firm, we want to work off of what happens when a computer gets breached either because of installing a malicious … Read more

Step by Step Guide to Create a Reoccuring Teams Webinar
Welcome to our step-by-step guide on how to create a recurring Teams webinar Start by opening Microsoft Teams (Work or School) on your computer On the left-hand side select CALENDAR Now Select … Read more

How to Stop Chrome From Asking to Store Passwords
There are many reasons to stop Chrome from asking to store passwords, as a cybersecurity services company we believe you should use a secure password managed because these passwords can easily … Read more

Why Do Hybrid Work Environments Need Cybersecurity
With a hybrid work environment, where employees work both remotely and in an office, you will need to rethink the risks associated with employees taking their work home: 1. **Increased Attack … Read more

How to Stop Shared Mailbox from Showing up in Outlook for Microsoft 365
If you have access to a shared mailbox in Office 365, by default the mailbox will show up in your Outlook account. This is how to stop a shared mailbox from … Read more

Wrong Email Address in the to Line
If you have an issue where the TO field on your phone is showing the wrong display name or email address then it is typically a Contact Card issue. To fix … Read more

How to Easily Perform an on-Prem Exchange Server to Office 365 Email Migration
After having performed dozens of on-premise Exchange to Office 365 Hosted exchange migrations, the path of least resistance for these email migrations is to use a combination of tool. Microsoft Office … Read more

How to Pause Azure AD Connect Sync
To pause Microsoft Office 365 Entra or Azure AD Connect, you will need to run a Powershell command because simply disabling services will not work. If you need a managed IT services company to … Read more

The History of Cyber Security
The history of cyber attacks dates back to the early days of computer technology. Throughout this history, cyber attacks have become more complex, diverse, and damaging. The motivations behind attacks have … Read more

How Has Ransomware and Cyber Attacks Evolved
Ransomware and cyber attacks have evolved significantly over the years, with attackers adopting more sophisticated techniques and strategies. Here are some key trends in the evolution of ransomware and cyber attacks: The … Read more

Scammers Are Now Using AI to Impersonate Family Members
Scammers have started using artificial intelligence (AI) in various ways to carry out more sophisticated and convincing scams. A new AI scam going around is targeting the elderly. The scammer will … Read more

Cyber Security Best Practices for Illinois Law Firms
Securing Your Law Firm: Cyber Security Best Practices for Illinois-Based Firms No matter what type of business you run, the world of digital technology has become an essential part of everyday … Read more

How to Fix ELO POS Not Printing
How to Fix ELO Touchscreen Point of Sale System Not Printing We have found that ELO touchscreens with built-in Star printers or Zebra printers will stop printing for seemingly no reason, … Read more

HP Printer Runs out of Ink Extremely Fast
Does your HP Laserjet, Canon, Epson or Ricoh Printer run out of ink way too fast? A lot of times the print quality is what chews up so much ink. DPI (Dots … Read more

Fix ‘Your Sign-in Settings Don’t Meet Your Organizations 2-Step Verification Policy’
Fix Google Gmail Error – Your Sign-in Settings Don’t Meet Your Organizations 2-Step Verification Policy When Mandatory 2FA is turned on in Google Workspace, you may run into an issue where gmail … Read more

LME Services Recognized by GoodFirms
LME Services Recognized by GoodFirms as the Best Company to Work With Digital transformation and automation are revolutionizing the world. Adopting digital solutions is critical for businesses as it enables them to … Read more

What Is ChatGPT
What is so special about ChatGPT ChatGPT is a free-to-use A.I. chatbot (artificial intelligence tool) that lets you have Q&A interactions with a chatbot that most in the world would mistake … Read more

Cant Sync Office 365 Sharepoint Site Library
Is your Sharepoint online site SYNC button greyed out or completely missing, well here is the fix First, make sure you have permission to access the site, if you can see … Read more

Office 365 Backup Consultants
Do you have Office 365 and worry about it being properly backed up and monitored? There are loads of backup solutions, services, and recovery services but which one is the best, … Read more

Join Our MSP Referral Program – Send a Referral to an MSP and Get PAID
LME Services is looking to grow and we would love your help. We are looking at taking on clients anywhere in the United States so introduce us and if we close … Read more

New Windows Computer Won’t Sign in with Office 365 Email Credentials
Is your Office 365 ID not working on your NEW Windows 10 or Windows 11 Computer? Whelp, that’s because it’s not asking for your Microsoft 365 work credentials it’s asking for … Read more

LME Services Is Now Listed Amongst Upcity’s Top Managed IT Services Providers!
LME Services is thrilled to announce that we are officially a part of the UpCity community of Chicago’s managed IT services providers! LME Services is a mid-sized IT services company that … Read more

What a Google User Sees When You Enable 2FA in Google Workspace
Turning on 2-factor authentication for Google Workspace, or any email account, should be mandatory for all email accounts but especially for work email accounts like Google Workspace as studies have shown … Read more

How IT Services Can Help Businesses Succeed
Technology has become so deeply embedded in our lives that it is hard to imagine a world without it. This is especially true for businesses, which rely on technology to keep their … Read more

What Is an IT Services Continuity Plan and How Does It Benefit Businesses?
An IT services continuity plan is a strategy that outlines the steps needed to keep an organization’s IT services running during any disruption or disaster. This type of plan helps organizations recover … Read more

Exploring the Difference between Computer Science and Information Technology
If you’re interested in a career in tech, you may be wondering what the difference is between computer science and information technology. While they are both fields related to computers, they … Read more

How to Fix When Wifi Stops Working on Lenovo or Dell Laptop
When the wireless on your laptop stops working either because it connects and the internet doesn’t work or because you get a cannot connect error, the answer is often updates and … Read more

New Email Scam
The latest email scam looks like this: Good afternoon, Please take a look at the attached document ASAP. And have a nice day. The email has an attachment that … Read more

Cloud Data Migration
How We Plan a Cloud Data Migration Proper data migrations involve 4 basic steps: Moving important or sensitive data and decommissioning legacy systems can put stakeholders on edge. Having … Read more

How to Move Your Servers to the Cloud
We capture the physical server Make the container accessible from the target server Part 3: Deploy from the container into the Cloud After the migration: Once the … Read more

What Are the Pros and Cons of Moving to SharePoint Online
SharePoint Online is a file repository service provided by Microsoft’s Office 365 platform. So the question everyone has is, is it a good replacement for a Windows File Server and should … Read more

Fix OneDrive & SharePoint Sync Error
Fix OneDrive Error – Your IT Admin Doesn’t Allow Syncing of SharePoint Folder / Library Users can now Sync SharePoint folders via OneDrive rather than the clunky option of opening SharePoint … Read more

How to Ensure Your Data Never Disappears
Our disaster recovery plan goes something like this “HELP, HELP!” – Dilbert If your server/cloud/laptop/PC were to suddenly crash and be devoid of all the work and information you have stored … Read more

An MSP Break-up Guidebook
Transitioning to a new managed service provider may seem like a daunting process, but it doesn’t have to be. Lawyers are sometimes involved but often the transfer process is cut and … Read more

Can’t Set up Office 365 on Outlook
If you have two-factor authentication and you get this message when trying to set up your office 365 email account within outlook then here is the fix (it is likely a … Read more

How to Create Office 365 Rule to Turn off Spam Filtering
Often times it’s easier to just turn off Spam Filtering than it is to ask users to keep adding people to Whitelists, so this is how you can create an Office 365 … Read more

Create Office 365 Rule to Allow Only Email from Specific Smart Host or IP Addresses
Here is how to tighten up email delivery so that only approved senders, like smarthosts, can send email to your Office 365 accounts Microsoft Exchange servers had a provision to allow only … Read more

How to Stop Your Office 365 and Google Workspace Email Accounts from Getting Hacked
Getting one of your business email accounts hacked CAN AND WILL HAPPEN without proper procedures in place and once that email account gets hacked it can balloon into wire transfer fraud, … Read more

Email Audit and Office 365 Search Experts
Law Firms, Accounting Firms & Legal Email Audits – LME Services Can Easily Find and Export All Relevant Office 365 Emails for You 29th Street Capital – Real Estate Investors – … Read more

How to Setup Remote Access to Your Office for FREE during Covid Coronavirus Pandemic
There are many choices when it comes to setting up secure remote access for your business and employees so let’s cover your options and the PROS and CONS of things likes … Read more

How to Protect against Remote Desktop Hacking
Like most cybersecurity topics, there is no way to 100% stop remote desktop hacking but we can make it very difficult I have heard from other techs that you should never … Read more

LME’s IT Services Commended for Superior Customer Sastisfaction
Did you know that in the last decade United States based outsourced IT services has exponentially increased? With LME just a call away, you can access us and our expertise whenever … Read more

How to Stop Office 365 From Sending Winmail.dat
Winmail.dat is a file that gets created when email clients, usually Apple products like iPhones and MacBooks, can’t interpret the format of an email If you want a great Office 365 consultant … Read more

Law Firm Transition to MSP Case Study
CASE STUDY – Transitioning from 3rd Party Break/Fix Support to LME Managed Services Hansen and Cleary – Law Firm – MSP Transition Case Study Hansen and Cleary, special education and … Read more

Start a Service Business with No Risk – Page 1a
Figure out Who You Are, Figure out Who They Are, Figure out How to Honestly Speak to Them Jon opens up google and types in ‘IT Services near me’ to see … Read more

What Does Windows 7 End of Life Mean for Your Business
What does Windows 7 End of Life Mean for your Business The end of the Windows 7 lifecycle is set for January 2020, which means that Microsoft is discontinuing all support, security … Read more

Stop Hackers from Remotely Accessing Your Computer via RDP
Here is how to secure your Remote Desktop services and stop hackers from attempting to brute force passwords to your work computers If you’re not worried about hackers remotely accessing your computers … Read more

How to Easily Send Self-Destructing Emails
If your feeling a bit like Chief Quimby in Inspector Gadget and would like your emails to self destruct after you’ve delivered them that we’ve got just the tools. If … Read more

Disable Spam and Junk Filtering for All Users in Office 365 Using PowerShell with MFA Enabled
Here is how to turn off junk and spam filtering in Office 365 for all users You have to use PowerShell, and it takes a specific set of tools and commands that … Read more

Cyber Security Plan
I Woke up and Everything Was Gone Joe woke up to the buzzing of his phone and a hundred texts. “Everything is gone” Their CRM database was corrupted. His domain controller … Read more

Add Dropbox Functionality to Your Windows Server
For years, people have wanted to add dropbox functionality to their windows servers so that they can easily access their server files while out of the office but businesses were stuck … Read more

LME Services Recognized as a Chicago Leader by Clutch
Open since 1994, LME Services is a Chicago-based, family-run IT services company. Low overhead combined with our unique IT support delivery strategy means that we are able to provide clients an … Read more

SEO Case Study
SEO CASE STUDY – California Law Firm SEO Implementation Law Office of Alexandra R. McIntosh – Lawyer Alexandra McIntosh, a San Diego County based Law Firm, had the goal of … Read more

Google Plus Hacked
Google Plus Was Hacked And… No One Cares Breaking news came out of Silicon Valley this week when Google announced that a major security flaw had exposed the data of nearly … Read more

How to Hack WiFi Passwords in 3 Easy Steps
How to Hack a Wifi Network Want to learn how to hack a WiFi password or, in our case, protect yourself from WiFi hacking then here are the steps hackers use to crack … Read more

Dell OptiPlex Won’t Boot after SSD Clone of Windows 10
I recently had an issue where I had used Acronis clone to image Windows 10 from a SATA HDD over to SanDisk SSD and after the cloning the Dell OptiPlex 3040 … Read more

LifeLock Unlocked by Security Flaw
Identity theft protection firm LifeLock recently fixed a vulnerability on its site that exposed their customer’s email addresses to anyone with a basic understanding of how to use a web browser. Lifelock, more … Read more

How to Connect to Office 365 Email with a New Device When Multi-Factor Authentication Is Turned On
The important item to note is that when Multi-Factor Authentication is turned on, your regular Office 365 password will not work when you attempt to add (or resume using) your computer, … Read more

How to Get 200 Daily Visitors to Your Website
How LME’s Website Got to 200 Daily Visitors and Yours Can Too When I took over our website we had zero visitors. It had our company name a picture of our … Read more

Texas Cancer Center Ordered to Pay $4.3 Million Fine for HIPAA Violation
The U.S. Department of Health and Human Services ruled that The University of Texas MD Anderson Cancer Center violated the HIPAA Act and was ordered to pay $4.3 million to the … Read more

Why Is Gmail Treating My Exchange Server’s Domain Emails as Spam
Here is how to fix when Gmail or Microsoft 365 are treating your work domain emails like spam You are likely going into spam because your email domain’s hosted DNS records, specifically … Read more

The Easy and Free Way to Record and Send an Error Message
People that have tech issues often forget why an error occurred when they explain it to us later (or things will work without issue when they try to show us). All … Read more

Why You Need to Turn on 2 Factor Authentication
You need to turn on 2 Factor Authentication pronto because its the only way to A) know if someone is trying to get in and B) if someone has your password. … Read more

How to Choose an IT Managed Services Provider
To begin understanding how to choose an IT Managed Services Provider, you need to understand what the heck an MSP is in the first place. Simply put, an MSP is an … Read more

CASE STUDY – Transitioning from Break/Fix Support to Managed Services
Prairie Contractors, Inc. – General Contractor Prairie Contactors, a general contractor and construction services company, had the goal of transitioning their IT Services and Tech Management away from break/fix hourly IT … Read more

LME Among Top Managed Services Providers
Clutch, an independent market research firm based in Washington DC recently released of the list of the top IT services firms in the Chicago area, and LME Services is proud to … Read more

Why Your Bad I.T. Guy Will Kill Your Business
Warning: The ineptitude of the I.T. Guy and the businesses network I am about to recount may be unsuitable for children or people with queasy stomachs. I’m Joe (hello joe) and … Read more

The Facebook Data Leak Explained – (in a Nutshell, It Was FB Doing Business as Usual)
Facebook has been in the headline a lot lately, and for all the wrong reasons. This time around FB is getting tangled in a whole mess of culpability gray areas that … Read more

How Do Computers Work, a Short Answer
How do computers work? This short article is designed to give you a layman’s view on how computers take electricity and turn that into computer games, word processing, sound and complex applications … Read more

What Are the Pros and Cons of Getting a Firewall
Before discussing what the pros and cons of getting a firewall are let’s quickly explain what a firewall is. What is a network firewall after all? A firewall is … Read more

How Setup a VPN to Your Office for FREE Using Teamviewer
To Setup a VPN to your Office for FREE using Teamviewer between your home and office computers you will need to download and install TeamViewer on both your home computer and your … Read more

Outlook Wont Connect to Office 365 Mailbox When There is an on Premise Exchange Server
How to fix the issue when Outlook won’t find Office 365 mailbox because there is an on-premise Microsoft Exchange server or legacy domain controller; often this issue will happen after performing an … Read more

How to Fix When Backup Exec Email Notifications Fail
How to fix when a Backup Exec email notifications will not send to outside email addresses We had already created a receive connector in Exchange for our copiers, scanners, etc., and had … Read more

Pros and Cons of an Office 365 Hybrid Migration
If your planning on moving to Microsoft Office 365 then you’re in the right place because today you will learn what an Office 365 migration is, what the Pros and Cons … Read more

MBAM Console – Failed to Open Service Control Manager Db Error Code 5 FIX
Here is how to fix Malwarebytes Console DB rrror Code 5 When doing a remote client push from the Malwarebytes Management Console I received the error ” Installation failed. Failed to open … Read more

Get Alerted When Internet Speeds Drop
If you want to get alerts when your internet speeds slow down, here is a nice way to get notified. You can be sure the ISP’s aren’t going to tell you there … Read more

Have LME Services Perform a Network Audit
Getting a network audit performed is a key component to any secure business. With the prevalence of malware, viruses, backdoors and spear phishing techniques it is vital for business managers to not … Read more

Does GoDaddy and Network Solutions Buy Searched Domains
Do GoDaddy and Network Solutions buy searched domains? Why yes, diligent tech investigators, they certainly do. Seems kind of scummy, doesn’t it? Yep, it sure does. Now, GoDaddy and Network Solutions will … Read more

How Bad Was the CCleaner Hack… It’s Equifax Bad
How Bad was the CCleaner Hack? So bad that most security experts recommend that you completely remove and reinstall Windows if you had the afflicted CCleaner version installed What is CCleaner? CCLeaner … Read more

What Happend with the Equifax Hack in Layman’s Terms
By now you have probably already learned about the massive data hording giant that is Equifax. Whether you volunteer your information to them or not, Equifax is doing its best to aggregate … Read more

How to Search for Web Pages Based on Their Creation Date
Every typed in a search term on Google and wondered how to search for web pages based on their creation date? If I’m searching for “the best website of 2017” and … Read more

Is Your Linksys or D-Link Router Safe and Secure?
Wait, what is the CIA doing with my home router? According to documents released by WikiLeaks, home routers from 10 major manufacturers including Linksys, DLink and Belkin can be turned into … Read more

Get a Simple Cloud Backup Solution for Your Computer
Get a Simple Cloud Backup Solution for Your Computer Do you have YEARS’ worth of Holidays, Family Vacations and Personal Photo’s sitting on a LONE computer? Do you have work files … Read more

How to Change Your Internet Browser Home Page
Different people like different home pages greeting them when they open up their browsers so today you will learn how to change your home page in Google Chrome, Internet Explorer, Edge … Read more

What Is the about:Blank Page in My Web Browser Used For
While most people prefer to use a specific webpage as the home page in their web browser, others like the idea of having pages load blank instead, or they simply had … Read more

How to Connect Android Phone or iPhone to Office 365
This is how to connect an Android Phone or iPhone to your Hosted Exchange Office 365 email account, including those with Multi-Factor Authentication Android Phone Office 365 Email Setup: … Read more

WannaCry Ransomware Virus Explained
What is the WannaCry Ransomware Virus? Simply put, the Wannacry virus is just another in a series of Ransomware viruses that encrypts your data and files and makes them inaccessible unless … Read more

How to Fix When You Can’t Install Windows OS from Bootable USB Drive
Here is how to fix when Windows won’t install from a bootable USB drive. If you need a managed IT services company to help install an operating system or troubleshoot any installation issues … Read more

Can Office 365 Block Group Policy, Why Yes, Yes It Can
Bad news IT nerds, Group Policy in Office 365 ain’t gonna work unless you’re ready to pay up because you will need one of these plans or your SOL when it … Read more

Google Docs Phishing Email Scam Explained
What Happened? A particularity clever Google Docs Zero Day flaw was exposed via a widespread phishing scam yesterday. The email masks itself as a user trying to share a Google Doc with … Read more

What Does Chrome’s Incognito Browsing Mode Do?
What does the Chrome incognito tab do? The chrome incognito tab is basically a simple way of telling Google Chrome to not save a LOCAL record of the websites you visit. Most … Read more

Ransomware Stopper
The LME Ransomware Stopper That Is So Simple Anyone Can Use It What Does It Do: How Does It Work: Why Has No One Else Done This: Mention this Post … Read more

How to Lock down Folder and File Creation on a Root Folder
Want to know how to lock down folder and file creation on a root folder? No? Well then why the hell are you here? Oh…. You said no doubt… Well good, cause … Read more

How to Run Add Remove Programs in Safe Mode
This is how to add or remove programs in safe mode To be able to run add remove programs in safe mode you need to: Copy these commands into the text file … Read more

Create a Web URL Desktop Shortcut That Opens in Internet Explorer IE
I needed to Create a Web URL Desktop Shortcut that Opens in Internet Explorer IE via Group Policy because a client has an internal Web Application that only works within IE. Outside … Read more

How to Setup Remote Access to Your Office for FREE
Here is how to setup Free Remote Access to your Office computer There are oodles of ways to remote access to your Office network for FREE, you can use a remote connection … Read more

Can’t Log into Computer after Disjoining from Domain
Can’t log in After Taking Computer Off Domain and joining it to a workgroup? If you’re a network admin then you have probably at some point needed to join (or unjoin) … Read more

Hyper-v Guest OS Network Adapter Not Working Fix
Here is how to fix when a Hyper-V Guest OS Network Adapter is not working We implement a lot of Hyper-V servers because Hyper-V is free, simple, and easy (well, easy enough at … Read more

How to Setup Scan to SMB Desktop on a Mac
Here are the steps to setup scanning on your Mac computer If you need a top managed IT services company to help setup scanning on your Apple computer then give LME a call How … Read more

This Is Why Encryption Is so Important
Let’s face it, computers, phones, and tablets are hackable. Microsoft, Apple, and Google all have Zero Days (fatal security flaws) that talented hackers and state-sponsored organizations can use to get anything … Read more

How to Easily Diagnose if an Email Is Fake or Malicious
Fake and malicious emails get more clever by the day, so here are the 2 easiest ways that anyone can use to diagnose if an email is fake or malicious. Click … Read more

How to Connect Outlook to Office 365 in a Windows Domain
You would think that connecting a Microsoft Product (outlook 2010) to another Microsoft product (office 365) while on a Microsoft Domain would be simple, but its not. So if you have … Read more

Checking for Windows Update Fix
If you’ve installed a fresh copy of Windows 7, Windows 8 or Windows 10 and noticed that either the updates are not coming through or that it is stuck on “checking … Read more

What Are These Push Notifications?
How are companies able to push notifications to my computer? The service that allows us to send notifications to you is called Push Notifications. Push notifications are a feature built into mobile … Read more

How to Fix the Log onto Office 365 & Exchange ActiveSync EAS Outlook error – Something Went Wrong
Typically we see the “Cannot Log onto Exchange ActiveSync mail server (EAS) The server cannot be found” issue when Outlook is trying to connect to an Exchange server or the ‘Something Went … Read more

How to Get DoFollow Backlinks from Facebook
Here is how to get DoFollow backlinks from Facebook to increase your SEO score We are going to start with the assumption that you already have a business Facebook page and a … Read more

What the Heck Is Bitcoin?
You have probably at some point in your internet browsing history come across an article or website referencing “Bitcoin”. You may have even noticed that a lot of legitimate companies are accepting … Read more

The 6 Tech Habits of High Performing SMBs
According to the Bureau of Labor Statistics, about 50% of small businesses fail in the first four years. Our economy is driven by small and private businesses which makes it a highly competitive marketplace, … Read more

Get Instant Alerts if Your Business Servers or Business Internet Go Down
How to Get Alerts When Your Internet Goes Down If you want to get instantly alerted when your business internet goes down, we have a simple solution for you If you’re … Read more

The Program That Will Stop Ransomware and Employee Theft in Its Tracks
Data theft is a common occurrence and is something that is only getting more complex and prevalent but is getting harder and harder to stop. What we have recognized is that … Read more

Review Your IT Consultants Proposals (AKA, Is My It Guy Ripping Me Off)
I’ve seen enough contracts from IT companies previously used by clients to know that people get ripped off all the time, so I simply want to give you the ability to … Read more

Fix Konica Scan to Email Office 365 Issue
If you need to know how to setup scan to email on a Canon, Toshiba, Xerox, and Konica Minolta then you will want to use Office 365 Direct Send (as long … Read more

How to Diagnose and Fix the Dreaded BSOD
Most, if not all, Windows users will have to Diagnose and Fix the Blue Screen of Death (or BSOD) at some point in their life, here is how to do this. … Read more

How to Reclaim Your Privacy from Windows 10
“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good … Read more

Windows 10 RRAS VPN Wont Connect – Fix
I recently upgraded to Windows 10 and came across an issue where Windows 10 VPN would not connect to my Windows RRAS Server. While setting up the VPN to connect to … Read more

iPhone Connects to Microsoft Exchange Server but Email Wont Sync
Here is a fix for situations where Android or iPhones will connect to a Microsoft Exchange Server but email won’t sync I have encountered the sync error when using Microsoft Exchange … Read more

How to Export Your Autocomplete Contact List from Outlook and Import Email Addresses into MailChimp
A newsletter is a powerful marketing tool that can benefit by having as many email addresses in it as possible – so here is how to easily export your autocomplete list … Read more
How to Record Your Computer Screen
There are many times when it would be very beneficial to record what you are doing on your computer so you can easily share it for training or to remind yourself how to … Read more

Locky Virus Spreads through Word Macros
A cryptolocker variant, the locky virus, has found a new way to infect your computer through the process of Word document Macros. The infected Work document will request that you enable macros in Word and … Read more

Weak Ephemeral Diffie-Hellman Public Key
If your getting the “Server has a weak ephemeral Diffie-Hellman public key” error its because your trying to access an unsecured webpage. Unfortunately the internet and local intranets are riddled with these … Read more

Why You Need an SSD
If you follow computer technology than you’ve probably heard that Solid State Hard Drives (or SSDs) are the single best upgrade you can add to your computer. But what is an SSD … Read more
15 Most Useful Keyboard Shortcuts
Since we like to preach working faster and smarter we thought we would provide a list of the 15 most useful keyboard shortcuts in Windows. I want you to think about something … Read more