727-216-8010 / 805 618-1853 info@protekitsolutions.com
background

SonicWall VPN Setup Guide: NetExtender and MobileConnect Configuration

(this document provides a template the IT administrators / help desk can use as remote access write-ups for their employees) Sonicwall Firewalls and SMA (Secure Mobile Access) network appliances are among the leading firewall and VPN remote access solutions and brand in the world. They have always been known for their stability, very comprehensive feature […]

PREVENTING EMAIL SPOOFING/PHISHING

PREVENTING EMAIL SPOOFING/PHISHING: (This topic is centered around Microsoft 365 hosted emails but applies to other mail providers.) PHISHING/SPOOFING EMAIL DEFINED: A phishing/spoofing email is a fraudulent email that a cybercriminal has designed to fool end users and employees into thinking the email is legitimately from another employee, vendor, boss or friend. Most examples of […]

WHERE DID OUR MICROSOFT VOLUME LICENSES GO?

The Microsoft Volume Licensing Service Center was the go-to portal for most IT professionals that purchased Microsoft Volume Licenses such as Windows Server, Microsoft Office, User CALs, RDS, Exchange, SQL, VDI, Sharepoint, Windows Desktop, etc. This was the case for well over a decade but in April 2024 it was officially retired. Microsoft has been […]

Company Emails in Personal Email Accounts

HOW TO RETRIEVE COMPANY EMAILS FROM PERSONAL ACCOUNTS USING BITTITAN.COM AND TRANSFER THEM TO GOOGLE WORKSPACE EMPLOYEES USING PERSONAL EMAIL PLATFORMS LIKE GMAIL AND YAHOO TO “POP” COMPANY EMAILS PROBLEM: Many small businesses have allowed their employees to either use their personal email (such as Gmail, Yahoo, Outlook, etc.) for work or have allowed them […]

Top 7 Cyber Security Policies Every Company MUST Implement in 2025

In today’s digital landscape, where cyber threats are increasingly sophisticated, implementing robust cybersecurity defenses is no longer optional—it’s imperative. With cybercriminals constantly evolving their tactics, companies must stay one step ahead to protect their sensitive data and maintain business continuity. We will explore essential cybersecurity defenses that every organization should implement to safeguard their assets […]

WINDOWS SERVER 2013 / 2016 / 2019 / 2022 EXTERNAL CONNECTOR LICENSES – HOW MICROSOFT DEFINES “EXTERNAL USERS”:

Microsoft’s definitions of “Internal Users” and “External Users” – specifically as it applies to the External Connector License VS a standard Windows Server User CAL – are somewhat vague and overlap. You can Google and find many descriptions from various sources on what their interpretation of these is, and they paraphrase what they think an […]