May 24, 2022
Microsoft Teams, Security
By design, Microsoft 365 enables communication and collaboration across groups of users and organizations. In the same light, it provides ways through which administrators can restrict communication and collaboration between different groups of users when necessary. Scenarios where this restriction…
Keep Reading »
May 06, 2022
Office 365, Security
There is no question that IT administrators need a user account to allow them to perform their tasks. Still, there is a question as to whether or not this user account that provides their day-to-day office work should also be…
Keep Reading »
Apr 12, 2022
Managed IT Support, Security
Yesterday Kaseya announced that it had entered into a definitive agreement to acquire Datto for $6.2 billion dollars in an all cash deal that would offer $35.50 per-share and bring Datto into private ownership in a deal led by Insight…
Keep Reading »
Apr 01, 2022
KnowledgeBase, Security, Tech Team Tips & Tricks, Windows
Happy April Fools Day! The day of the year when some IT staff think it might be humorous to do something to generate hundreds of support tickets “for the lolz”. Please do not be that person. If you want a…
Keep Reading »
Mar 30, 2022
Security
Divestitures entail spinning off a division or portion of a business to another company. Typically, the process needs to sell off a division of the business to streamline operations, improve outcomes, and reduce risk. For instance, a company may divest…
Keep Reading »
Mar 17, 2022
Azure, Security
According to a Statista report, about 47% of America’s workforce had never attempted working from home before 2020. Since then, the number has fallen to 34%. Still, only 17% of the workforce worked from home for five or more days a…
Keep Reading »
Mar 15, 2022
Security
We are increasingly seeing companies rely on a network of third-party vendors to offer organizational value and competitive advantage. This outsourcing of core functions is in a bid to derive efficiencies. Unfortunately, in doing so, organizations are potentially exposing themselves…
Keep Reading »
Feb 24, 2022
Cloud Computing, Security
After moving to the Cloud, most organizations mistakenly assume that their cloud hosting provider takes over their security. This assumption puts the organization at greater risk of breaches that necessitate Cloud Security Posture Management (CSPM). A CSPM solution available to…
Keep Reading »
Feb 08, 2022
Security
In mid-November, the Cybersecurity and Infrastructure Security Agency (CISA) released the Federal Government Cybersecurity Incident and Vulnerability Response Playbooks. These playbooks are designed to aid federal civilian agencies to respond to cybersecurity vulnerabilities. The CISA hopes to standardize the approaches federal…
Keep Reading »
Feb 01, 2022
News and Articles, Security
Executive Order 14028, Improving the Nation’s Cybersecurity, signed by Biden on May 12, 2021, mandates different agencies to enhance cybersecurity through various initiatives in the security and integrity of software and data. The order was prompted by numerous high-profile information security and…
Keep Reading »
Jan 25, 2022
Security
Long before the pandemic popularized the work from the home approach as a survival tactic, the remote work culture was already widespread. About ten years ago, when technologies like Slack, Google Zoom, and Drive that enabled remote work were introduced,…
Keep Reading »
Jan 18, 2022
News and Articles, Security
2021 has seen a series of alarming cybersecurity incidences that have propelled the Biden administration to take swift action. The latter comes in the form of a robust Congressional cybersecurity agenda aimed at expanding the nation’s cybersecurity capabilities. In retrospect,…
Keep Reading »