Skip to content
Monge IT Consulting, Inc.
  • About
  • Plans
  • Quote
  • Tips
  • News
  • Testimonials
  • Contact
Monge IT Consulting, Inc.
  • Protect Unused Domains: Why You Must Secure the Domains You Aren’t Using to Prevent Phishing

    Why You Must Protect the Domains You Aren’t Using: A Critical Step in Preventing Phishing

    We recently wrote an article for those who manage their own Internet domain names about using SPF, DKIM, and DMARC to prevent your active domains from being used in phishing attacks and to improve the deliverability of legitimate email. These protections are essential for any domain you use to send or receive messages. But what…

    Read More Why You Must Protect the Domains You Aren’t Using: A Critical Step in Preventing PhishingContinue

  • What Is Safe Mode, and When Should You Use It?

    What Is Safe Mode, and When Should You Use It?

    Although Macs are highly reliable, unusual problems can still rear their ugly heads. Often, these issues are caused by software you’ve installed or accessories you’ve connected. If you’re experiencing Mac misbehavior that isn’t easily fixed by restarting, updating software, or unplugging a dodgy device, try safe mode. (Seriously, before checking if safe mode will help with a problem, you should always restart, ensure you’re running the latest version of macOS and any involved apps, and unplug non-essential peripherals.)

    Read More What Is Safe Mode, and When Should You Use It?Continue

  • Monge IT Windows to Mac Migration

    Windows to Mac Migration: A Case Study in Seamless Transition

    This white paper delves into the successful migration of BWM Global, a prominent supplier of premium promotional products and services to professional sports teams and corporate America, from a Windows-based IT infrastructure to a Mac centric environment. BWM Global encountered challenges due to slow hardware, outdated operating systems, and platform inconsistencies. The migration to a…

    Read More Windows to Mac Migration: A Case Study in Seamless TransitionContinue

  • Recovering from a Failed Update with a Nearby iPhone or iPad

    Restore Nearby iPhone: Recover a Stuck Update on iPhone 16 or A17 Pro iPad mini

    If your iPhone 16 or A17 Pro iPad mini gets stuck during an update, Apple’s new recovery feature lets you use a nearby iPhone or iPad to get back up and running. We hope you never need this new recovery option that Apple has added to the iPhone 16 and current iPad mini (with an…

    Read More Restore Nearby iPhone: Recover a Stuck Update on iPhone 16 or A17 Pro iPad miniContinue

  • Mac Terminal Malware Scam Monge IT

    Mac Terminal Malware Scam: Watch for This Copy‑Paste Attack

    Mac Terminal Malware Scam: Don’t Paste Unsolicited Commands. Here’s a new scam to watch for. A client reported running across a suspicious website masquerading as a human verification test.

    Read More Mac Terminal Malware Scam: Watch for This Copy‑Paste AttackContinue

  • Architecture copies

    Migrating to Google Workspace: Part 3 – Backups

    Our client needed a backup solution for cloud-based data stored in Google Workspace to address the short retention period of deleted data.  We chose an awesome cloud based service for its cost-effectiveness, ease of setup, and automation capabilities. Our plan includes multiple backup sources, enhanced data restore options, and indefinite data retention, providing a robust backup strategy for data stored in the cloud.

    Read More Migrating to Google Workspace: Part 3 – BackupsContinue

  • Building communications wires

    Migrating to Google Workspace: Part 2 – Communications

    Read how we successfully migrated our client’s email service from hosted Microsoft Exchange to Google Workspace. The migration process involved careful planning, user training, and the use of specialized migration tools.  The transition resulted in cost savings, improved collaboration tools, and enhanced security features for the company.

    Read More Migrating to Google Workspace: Part 2 – CommunicationsContinue

  • Mailbox with mail coming out.

    Export Email from Outlook Web App (OWA)

    This is an excerpt from a StackExchange post. This process is used to assist with exporting emails out of Outlook Web App (OWA) after a migration due to differences in allowable attachment sizes between the source and destination. Featured Image Photo by Cyrus Crossan on Unsplash

    Read More Export Email from Outlook Web App (OWA)Continue

  • Building with cloud in background in the sky

    Migrating to Google Workspace: Part 1 – The Data

    Read about our successful migration from a on-site server to Google Drive which was completed for our client located in a hurricane-prone area. The migration, which involved 2.4 TB of data, was done remotely over several weeks due to bandwidth limitations. Our client now enjoys improved file collaboration, increased storage, and scalability, with a greater than 5% monthly cost savings compared to their previous setup.

    Read More Migrating to Google Workspace: Part 1 – The DataContinue

  • SPF DKIM DMARC Monge IT

    SPF, DKIM, and DMARC: What They Are and Why You Need Them

    Email is a breeding ground for phishing attacks. The sheer volume and ease of sending make it the most attractive channel for scammers. While a mismatched sender address is a common warning sign, the most effective attacks succeed by spoofing legitimate addresses, making them almost impossible for a user to distinguish from a real email….

    Read More SPF, DKIM, and DMARC: What They Are and Why You Need ThemContinue

Page navigation

1 2 Next PageNext

Monge IT Consulting Logo Color

© 2025 Monge IT Consulting, Inc.

Facebook Linkedin YouTube

Proud supporting partner of Matthias Community!

  • About
  • Plans
  • Quote
  • Tips
  • News
  • Testimonials
  • Contact
Search