Making the change to remote work?
We're happy to help you stay connected

Learn more
,

Georgia’s Eighth Judicial District Uses Technology to Keep Courts in (Virtual) Session

Posted on September 24, 2020

When the pandemic suddenly threw the world into a place of uncertainty and unknowns, many organizations and institutions had to take immediate action to maintain a critical semblance of “business as usual.” For the court system, this meant coming up with alternative ways to keep the judicial process moving forward while at the same time keeping all those involved safe. For many, including the Eighth Judicial District of Georgia, the solution was virtual courtrooms.

,

Georgia’s Eighth Judicial District Uses Technology to Keep Courts in (Virtual) Session

Posted on September 24, 2020

When the pandemic suddenly threw the world into a place of uncertainty and unknowns, many organizations and institutions had to take immediate action to maintain a critical semblance of “business as usual.” For the court system, this meant coming up with alternative ways to keep the judicial process moving forward while at the same time keeping all those involved safe. For many, including the Eighth Judicial District of Georgia, the solution was virtual courtrooms.

,

Email Phishing: Protecting Your Organization

Posted on June 3, 2020

Email phishing is the most common cybersecurity attack leading to breaches, according to the 2019 Data Breach Investigations Report from Verizon. It's pervasive and does not discriminate. Organizations, small and large, must be vigilant. And while user training and awareness are integral parts to reducing email phishing incidents, having a best-in-class email protection solution is critical.

, , ,

5 Features to Seek Out in a Cloud Solutions Provider

Posted on December 26, 2019

Ready to move to the cloud? Or has your current provider not lived up to expectations? Cloud solutions offer businesses many benefits. With cloud adoption, you'll enjoy more robust security and better accessibility of your data.

, , , , ,

Meet the New Standard for Business Email

Posted on January 15, 2016

If your email went down all Monday morning, or if half the messages and attachments in your inbox suddenly disappeared, what kind of impact would that have on your business? How much money […]

, ,

Intermedia’s Dedicated Exchange is available now on AWS

Posted on January 13, 2016

Is your company using AWS? Thinking about moving your email to the cloud? Here’s some great news: now you can get Intermedia’s Dedicated Microsoft® Exchange on AWS. Dedicated […]

, , ,

Is it time to upgrade to Exchange 2016?

Posted on December 23, 2015

Now that Exchange 2016 has launched, I’m starting to get asked by IT Admins whether or not it’s really worth it to upgrade in the new year. I would say that anyone running […]

, , , , , ,

5 Ways Your Email Could Be At Risk

Posted on December 15, 2015

Nearly all businesses rely on email to assist with day-to-day activities. But many businesses haven’t addressed new and seemingly unavoidable vulnerabilities.  If you are running an […]

,

It’s not the end of the world: Recovering deleted items in Outlook

Posted on October 14, 2015

It’s probably happened to everyone: you meant to hit “reply” and accidentally hit “delete” instead. The good news is that deleting items by mistake does not […]

, , ,

What is “Autodiscover”—and why do I need it?

Posted on September 8, 2015

The Microsoft Exchange environment can be quite complicated. There are a ton of Fully Qualified Domain Names (FQDNs) for servers, which gives you a lot to memorize when you configure clients […]

How to create, compact, compare or delete offline folders in Outlook

Posted on August 20, 2015

How do I create an offline (.OST) folder? What do I do if I need to compact an offline folder? How do I repair an .OST file offline? These are common questions we receive from Outlook® […]

How to fix ‘cannot open your default email folders’

Posted on July 24, 2015

We take great pride in ensuring a Worry-Free Experience™ for our customers. While our support team is available 24/7 to assist with your needs, we realize from time to time, you might […]

,

Fighting the toughest battle in Cybercrime: Spear phishing

Posted on April 24, 2015

Introduction:  Just last week CBS ran a 60 Minutes segment about the cyber-attack on Sony Pictures, and it brought to light the dangers of phishing. Specifically, it highlighted a tactic […]

,

Lack of efficiency: The hidden costs of Exchange providers, Part 6

Posted on December 24, 2014

In case you missed it: Read Part I, Part II, Part III, Part IV and Part V of this series. My family is coming over for the holidays! Exciting! But also stressful. Among other things, I […]