Microsoft Practice Manager Mark Alexander shares three quick-and-easy methods for inventorying devices that are within reach of anyone charged with managing an M365 tenant.
John Parker outlines 3 common negative side effects arising when making architectural upgrades that can, with planning and careful consideration, be avoided.
AI seems poised to disrupt SOC services. Our Senior Cyber Security Engineer, David Belkin, ponders what such a disruption might entail, acknowledging the dangers that lie ahead.
This new alternative to the traditional VPN is positioned to make a huge impact in the market due to its innovative approach to providing remote access to resources within the firewall. And is this intended application as a VPN replacement just scratching the surface of its potential?
Who knew that looking through a medieval lens could bring the process of building a strategic cybersecurity program into focus?! Our own cyberknight, Nick Whittington, dons his chainmail and lays out a useful outline to follow in the quest to protect your company’s data in a modern world.
While advantages of a cloud architecture apply to more organizations than ever, this decision still isn’t exactly a one-size-fits-all scenario. Let's cut to the chase to see if running Exchange on prem is a legitimate option for you.
Being aware of the risks is a starting point in the effort to mitigate them. Behold the modern world, a melting pot of technologies where BYOD, sadly, doesn’t stand for “Bring Your Own Donuts”.