Blog

What is Conditional Access?

Conditional Access (CA) is a security policy enforcement solution available with your Azure AD Premium P1 or Microsoft 365 Business Premium subscription. Once users initiate the log-in process with a password, the application employs If/Then logic to grant access or deny access based on certain conditions or “signals.” Common Conditions Correct Username and Password Location of Login Device ...

Read More

Dangers Of LinkedIn: 4 Security Features To Use TODAY

A recent report from Check Point Research revealed a shocking statistic – the Microsoft-owned business platform LinkedIn is impersonated in nearly half of all phishing attacks globally. One of the ways scammers leverage LinkedIn to deploy their phishing attack is when they zero in on anyone seeking a new job or career change. While e-mails like ...

Read More

Massive Layoffs In 2024 Create A Serious Threat To Your Cybersecurity

The massive wave of layoffs in 2024 brings a cybersecurity threat that most business owners aren’t focusing on – offboarding employees. Even big-time brands that you would expect to have top-of-the-line cybersecurity systems, processes and procedures in place fail to adequately protect themselves from insider threats. This August marks a year since two disgruntled Tesla ...

Read More

Autopilot for Device Deployment

Introduction In today’s digital world, many businesses are now deploying devices more than ever before.  Some of these could be the traditional hard-wired ones, wireless ones, and even those that are virtualized.  But, manually deploying all of them can be a very time consuming and labor-intensive task, especially if you have a lot of them.  This ...

Read More

An Introduction To Microsoft Bookings

There is no doubt that with an M365 subscription that you procure, there are a lot of cool features that come with it.  One of the new features is “Microsoft Bookings” which can be used to book meetings with other people. What Is Microsoft Bookings? Microsoft defines it as follows: “Microsoft Bookings makes scheduling and managing appointments a ...

Read More

The Licensing For Defender Vulnerability Management

There is no doubt that Microsoft has a lot of licensing and subscription plans for their various M365 products, and it can cause quite a bit of confusion for the end user.  In this article, we attempt to resolve some of these issues by focusing on the Defender Vulnerability Management package. What Is Defender Vulnerability Management? Before ...

Read More

Which Licenses Do I Need? The Differences Between M365 And GCC High

At the present time, M365 is predominantly being used by both businesses and even the Federal Government.  But, there are many different flavors of it that exist, especially between the private and the public sectors.  In this article, we take a closer look at two of them:  The Commercial M365 and the M365 for the ...

Read More

How To Manage Volume Licensing In The M365 Portal

If your business is large enough, it is quite possible that you will require many licenses to procure for your end users.  Getting them in bulk, or even using just a couple of licenses on many wireless devices and/or computers is known as “Volume Licensing”.  In this article, we examine some ways in which you ...

Read More

Apple Might Never Have Released The Macintosh If This Happened

Steve Wozniak was asked in an interview what he would have done differently if he had been Apple’s CEO instead of Jobs. He said he would have been “a lot nicer to people,” but then quickly added that IF he had been CEO, they might never have released the Macintosh. Jobs was known for being ruthless ...

Read More

The Silent Danger: A Powerful Lesson For Every Business From This $1.6 Billion Ransomware Attack

In recent months, the alarming cybersecurity breach at Change Healthcare, the health care payment-processing company under the health care giant UnitedHealth Group, has thrown a spotlight on a chilling reality: cyberthreats can lurk undetected within our networks, ready to unleash chaos at a moment’s notice. The breach, executed by the notorious ALPHV/BlackCat hacker group, involved ...

Read More