This Overlooked Windows Setting Leaves You Vulnerable: Here’s How to Fix It

For many small business owners, nonprofit managers, and city administrators, the idea of a cyberattack feels distant, until it isn’t. The reality is that most breaches don’t happen through brute force or sophisticated code. They happen because of misconfigured settings or basic security features being turned off.

One such example? Memory integrity protection, a powerful Windows security feature that’s disabled by default on many machines.

If your team relies on Windows 10 or Windows 11 devices, this guide will explain what this setting does, why it matters, and how to turn it on.

Memory Integrity Protection Disabled? Enable this vital windows security feature now!

What Is Memory Integrity Protection?

Memory integrity is part of Microsoft’s Core Isolation security system. It uses virtualization-based security to protect your computer from low-level attacks that target your system’s core processes.

Here’s what it does:

  • Prevents malicious code from injecting into high-level processes
  • Stops some forms of zero-day and kernel-level attacks
  • Adds an extra layer of protection to critical Windows functions

This feature is especially valuable for SMBs and government entities, where one infected machine can compromise shared files, connected drives, or cloud systems.


Why Is It Turned Off by Default?

The short answer: compatibility.

Memory integrity requires driver compliance, if your system has outdated, unsigned, or incompatible drivers (especially for older hardware or third-party devices), Windows turns the feature off automatically to prevent performance issues.

That means even brand-new business computers may not have this feature enabled unless someone specifically checks and resolves driver conflicts.


How to Check If It’s Enabled on Your Device

Here’s how to find out:

  1. Press Start and type Core Isolation
  2. Click on Core Isolation under Device Security
  3. Look for Memory Integrity
  4. If it says “Off”, click Turn On
  5. Reboot your system when prompted

⚠️ If you receive an error or warning about incompatible drivers, don’t ignore it, note the driver’s name and contact your IT support provider to update or replace it.


What to Do If Memory Integrity Won’t Turn On

Sometimes, enabling this setting isn’t straightforward. Here’s what you or your IT team should do:

  • Update drivers using the manufacturer’s official websites
  • Uninstall unused or legacy drivers that may be blocking the feature
  • Run Windows Update to check for system fixes
  • Consider a hardware refresh if you’re consistently running into driver issues on older machines

Why This Setting Is Especially Critical for Public Sector and Regulated Organizations

For municipalities, school districts, and nonprofits handling sensitive citizen or donor data, kernel-level attacks can:

  • Undermine compliance with data protection regulations
  • Bypass traditional antivirus systems
  • Result in complete control over your devices by attackers

Enabling memory integrity protection is one of the easiest ways to reduce risk, and most organizations don’t even know it’s turned off.

Enable this Windows security setting now! For any assistance please contact us at SofTouchSystems.com.

SofTouch Systems Can Help

At SofTouch Systems, we help organizations across Central and South Texas:

  • Perform security audits on Windows endpoints
  • Check for missing or misconfigured protections
  • Update and patch systems organization-wide
  • Develop IT security policies that include hardware and driver vetting

Whether you’re a small town with five machines or a nonprofit running remote staff, we can help you secure every layer of your infrastructure, starting with the settings most people overlook.


Don’t Wait for a Breach to Flip the Switch

Cybersecurity isn’t always about expensive software. Sometimes, it’s as simple as enabling the settings Microsoft gave you and making sure they work properly across your entire network.

Check your device today. Then make a plan to check every device in your office or agency. And if you’re not sure where to start, you don’t have to do it alone.

Running Out of Gmail Space? Here’s How to Beat the 15GB Limit Without Losing Critical Emails

For many small businesses, nonprofits, and municipal teams, Google Workspace (formerly G Suite) is the backbone of daily communication. But over time, the 15GB of free storage across Gmail, Google Drive, and Google Photos can fill up, fast.

Once your inbox hits capacity, new messages bounce, attachments go missing, and workflows grind to a halt.

The good news? You don’t have to delete important emails or start paying for more space immediately. With the right cleanup strategy and tools, you can reclaim gigabytes of space and keep your digital operations running smoothly.

Here’s how to manage Gmail storage effectively, keep essential messages, and avoid disruptions, especially if your business or department isn’t ready to upgrade to a paid tier just yet.

your Gmail Storage. 1. Check what is hogging the space. 2. Delete by age or file size. 3. Get rid of junk emails.

Why Gmail’s 15GB Limit Is a Hidden Bottleneck for Business Users

While 15GB may sound generous, that space is shared across:

  • Gmail inbox (and sent mail)
  • Google Drive files (including large PDFs, video, ZIPs)
  • Google Photos (if syncing is enabled)

For small organizations with a single account managing multiple roles (e.g., HR, operations, finance), this shared cap becomes a liability.

Signs you’re approaching or exceeding Gmail’s limit:

  • You receive alerts like “You’re running out of space”
  • Clients say they get bounce-backs when emailing you
  • Google services become sluggish or stop syncing
  • Drive won’t allow uploads of new files

Rather than delete your archive or shell out for extra storage, try this first:


Step 1: Identify What’s Hogging Space

Visit GOOGLE to see a breakdown of how your space is being used across Gmail, Drive, and Photos.

Often, Gmail is the primary culprit, especially if your inbox holds years of attachments, newsletters, or junk mail you’ve forgotten about.


Step 2: Bulk-Delete Large Emails by Age

Use Gmail search filters to locate emails with large attachments:

This command finds all emails older than a year with attachments over 10MB. Review and delete anything non-critical (e.g., outdated reports, past contracts, media files).

You can also search by file type:

Once deleted, don’t forget to empty your Trash folder to free the space.


Step 3: Tame the Promotions and Social Tabs

Marketing emails and social updates often clog up inboxes. You can search and mass delete them like this:

Pro tip: Use Gmail’s “Select All Conversations” option to clear thousands of messages in seconds.

Step 4: Use Google’s Storage Management Tools

Google’s Storage Manager Tool highlights emails with large attachments, Drive clutter, and spam with one-click deletion options. It’s fast, easy, and surprisingly effective.


Step 5: Offload and Archive Critical Data Securely

If your inbox stores important records you can’t delete, consider exporting them using Google Takeout, or better yet — partner with a trusted IT provider like SofTouch Systems.

We help small businesses and public agencies:

  • Archive historical emails safely
  • Back up Gmail and Drive to external or cloud environments
  • Move to custom email hosting with higher limits and better control
  • Implement automated inbox hygiene policies for staff accounts

Why SofTouch Systems Recommends Proactive Email Storage Management

Hitting your storage limit isn’t just a nuisance — it can cost you:

  • Missed client emails
  • Lost opportunities
  • Breakdowns in internal communication
  • Compliance issues for organizations subject to data retention policies

If you’re already running low, it’s time to take action before business continuity is impacted.


Free Up Space Without Losing What Matters

Email is mission-critical. Don’t wait until your inbox grinds to a halt. With the right filters, tools, and storage strategies, you can extend the life of your Gmail account without deleting essential communications or upgrading prematurely.

Need help managing your inbox, migrating to a custom domain, or backing up years of valuable messages? SofTouch Systems has you covered.

How to Responsibly Recycle Old Computers and Printers: Without Paying a Dime

Outdated tech doesn’t just clutter your office, it can expose your business to unnecessary risk. Whether it’s an old desktop tucked in a closet or a stack of unused printers from your last upgrade, improper disposal of electronic equipment can lead to data leaks, environmental harm, and even regulatory headaches.

Fortunately, responsible recycling options are more accessible than ever, and in many cases, completely free.

This guide walks you through how to recycle your old tech the right way, protect your data, and even align your business with sustainable practices.

How to Responsibly recycle old computers and printers: For FREE 

A guide on responsible tech disposal.

Never Just Throw Away Old Tech

Every computer or printer that’s tossed into the trash could:

  • Leak data if hard drives aren’t properly wiped
  • Pollute local landfills with heavy metals and plastics
  • Violate regulations if your business handles sensitive or regulated data

For small businesses, municipalities, and nonprofit organizations, old IT equipment can create long-term liability. That’s why SofTouch Systems urges all clients to treat tech disposal as a serious IT policy decision, not just an office cleanup task.


Step 1: Back Up and Wipe All Devices

Before you recycle, back up important files and then perform a secure data wipe.

  • For Windows PCs: Use built-in “Reset This PC” and select “Remove Everything” → “Clean the Drive.”
  • For Macs: Use Disk Utility in Recovery Mode to erase drives securely.
  • For printers with storage: Check the manufacturer’s reset instructions to remove stored documents or contact lists.

SofTouch Systems can assist with secure device wiping, ensuring your business is protected from data leaks even after devices leave your hands.


Step 2: Use Manufacturer Take-Back Programs

Many major tech companies offer free recycling programs for old computers and peripherals, even if you’re not buying a new one.

  • Dell Reconnect: In partnership with Goodwill, Dell accepts any brand of computer equipment.
  • HP Planet Partners: Accepts HP-brand hardware and printing supplies.
  • Apple Trade-In: Recycles old Apple devices (or gives credit if eligible).

These programs often include free shipping labels or drop-off instructions.


Step 3: Check With Local Retailers

Several major retailers offer no-cost recycling drop-offs, especially for common business hardware:

  • Best Buy: Accepts laptops, printers, cables, and more — often up to three items per household/business per day.
  • Staples: Recycles tech for businesses and also provides data destruction services.

Tip: Call ahead to confirm which items they accept and whether any appointment is needed.


Step 4: Partner With Certified E-Waste Recyclers

If you’re disposing of a large quantity of equipment, it may be better to work with a R2- or e-Stewards-certified e-waste recycler. These certifications ensure proper handling and recycling practices.

Search here:

SofTouch Systems partners with certified recyclers and can coordinate pickup or drop-off as part of our managed IT support.


Step 5: Include Recycling in Your IT Lifecycle Policy

Recycling should be part of your business’s IT asset lifecycle management:

  • When onboarding new equipment, flag older items for future disposal
  • Maintain a log of decommissioned assets
  • Schedule annual or semi-annual recycling events for staff or clients

STS clients benefit from scheduled tech audits, which include guidance on what to retire, replace, or securely destroy.


A Final Word from SofTouch Systems

Recycling isn’t just a good deed, it’s a smart IT decision. With cyber threats on the rise and environmental responsibility becoming a community expectation, how you dispose of technology matters.

Need help managing your aging equipment or creating an official asset retirement policy? SofTouch Systems offers free IT evaluations for small businesses and local agencies across Central and South Texas.

Let’s secure your data, reduce your risk, and make space for smarter tech, the responsible way.