Blog

Microsoft Systems Center Versus Intune

Over the years, and especially when Azure first came out, Microsoft has developed many ways in terms of configuring and managing both your IT/Network Infrastructure, and even your devices as well.  But now the battle had been drawn between two main ones:  System Center Configuration Manager and Intune. We take a closer at both of them, and ...

Read More

Microsoft DNS Filtering

In the world that we live in today, just about anything can be considered as prey for the Cyber-attacker.  As we have seen with this pandemic, one of the favorite targets has been that of the heisting of domain names in order to create spoofed ones, in which the unsuspecting victim is lured into. One method ...

Read More

Microsoft’s New Pricing – Which Plan Is Best For You?

The M365 suite of Office applications primarily those of Excel, PowerPoint, and Word, has been around for quite some time. Consumers, especially those of businesses, have found it to be far most cost effective to use these productivity tools straight from the Cloud rather than buying them separately, at the retail level. There are a ...

Read More

It’s Time To Wake Up To The Reality Of Cyber Security In 2022

All across the world, hackers are targeting and exploiting security weaknesses and holding data hostage. In May, the Colonial Pipeline was hit by a cyber-attack that disrupted fuel supplies along the East Coast for several days. The company – and the FBI – paid hackers $4.4 million in Bitcoin to regain control of the system. Colonial ...

Read More

Microsoft’s Endpoint Detection – what’s in P1 and P2?

Microsoft is known for its many licensing plans, but there are two of them that we have not covered in more detail. They are the EDR Plan 1 and Plan 2. They are examined more closely in this article. What Is In Plan 1? Here is what is included: It has the following types of functionalities: Other platforms ...

Read More

Raise your Security Game with Microsoft’s Conditional Access

In today’s digital world, you hear a lot about granting privileges, rights, and accesses to shared resources on the most minimal level possible.  Technically, this is known as the concept of “Least Privilege”, and it simply means that you are giving your employees just what they need in terms of access to shared resources in ...

Read More

Why Microsoft Identity is important for your Cybersecurity

As we start to roll into 2022, the one thing that will be on people’s mind’s is that of Cybersecurity.  It is expected that this year could be the same or even worse in terms of the intensity of attacks, especially that of Ransomware.  Another area which will get a close watch is software security, ...

Read More

The Best IT-Related Resolutions For The New Year

The past couple of years have been difficult for just about everyone. Business owners and entrepreneurs have had to adapt and evolve to survive in an ever-changing climate. There’s no telling when or even if things will go back to what we once thought was “normal.” As we enter a New Year, many business owners ...

Read More

Cybersecurity Predictions For 2022

There is no doubt that 2021 gave Cybersecurity professionals a run for their money, no matter what their line of expertise is.  A lot of this was fueled by the sheer onslaught of Ransomware attacks, which was totally unprecedented.  This trend is expected to continue going into 2022, but what are the other Cyber predictions?  ...

Read More

How To Configure A Graphics Based VM In Azure

It seems like on an almost daily basis, there are new developments that keep occurring in Microsoft Azure.  One such facet is making your newly deployed Virtual Machine (VM) into hosting graphics-based packages.  We review the necessary steps in this article. How To Do It Here is how you do it: 1) Select the right VM: You will need ...

Read More