IT Security | May 14, 2020Email, security, and breachesEmail-based attacks can take many forms, and are typically deployed by cybercriminals in order to extort ransom or leak sensitive data. Just recently,...
Mobile Device Manager Plus | May 14, 2020How implementing a BYOD initiative helps prepare remote workers for COVID-19 era challengesAs the COVID-19 pandemic continues to force employees to work from home, businesses are facing new and unique...
General | May 13, 2020Cybersecurity use cases for better remote workforce management Credits- Illustrator: S Amirthalingam In the new normal, if your business has chosen remote operations, this...
Patch Manager Plus | May 13, 2020May Patch Tuesday 2020 fixes 111 vulnerabilitiesAs IT administrators do their best to cope with business continuity plans, it's imperative to understand and...
Patch Connect Plus | May 12, 2020Simplify third-party application management on Intune with Patch Connect PlusFor organizations using Microsoft's System Center Configuration Manager (SCCM) who are...
Security Information and Event Management | May 11, 2020SQL Server, Part 3: Adopting the principle of least privilegeIn the previous blog in this series, we discussed authentication and authorization...
M365 Manager Plus | May 11, 2020The Office of Inspector General's Office 365 audit checklist [Free e-book and webinar]Over the years, Microsoft has worked with federal agencies and contractors to ensure its...
General | May 8, 2020Five worthy reads: Multiexperience: The next milestone in the digital transformation curveFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
Endpoint Central | May 8, 2020Security configurations—Part two: 8 imperative security configurations for your arsenalIn part one of this two-part blog series, we discussed seven reasons security...
Applications Manager | May 7, 2020Redis monitoring 101: Metrics to watchRedis, which stands for Remote Dictionary Server, is an open source, in-memory data...