How To
“Those who fail to learn from history are condemned to repeat it.” It is critical to learn from yesterday’s vulnerabilities before they become tomorrow’s hacks. It is through this lens that we look back on…
When you start working with Logic apps, one of the things you’ll encounter is that there are hundreds of services presented as actions ava...
The major disasters this past year made people aware of a lot of things including the manner in which businesses assess risk and devise plan...
Guest blog co-written with Precision Solutions Group, Inc. As the technology landscape continues to change and evolve at lightning speed, CIOs and CTOs have more on their plates than ever before. For many, spending time…
Every 4th of July in many cities all over the United States there are massive fireworks displays for thousands to see. One of the biggest is right in our backyard in Boston, Massachusetts. The Independence…
The other day a customer was locking down a site collection but discovered that no matter what she did, all users in the entire organization still had read access. This, in a word, was troubling.…
Gone are the days of simple passwords. I remember the days (yes I am showing my age here), where everyone had the same password for everythi...
Outsourcing has been growing in popularity. It represents an opportunity for companies to expand, as needed, while cutting the costs associa...
In the every changing world of online threats, a new type of spear phishing attack has emerged. Have you ever gotten an email in your office...
Did you just open a document in Microsoft Word 2013 and nothing is happening? Oh, that’s right….. You forgot to click on that annoying, little, yellow button on the top of the window. Welcome to…
Regardless of your industry, staying proactive with patch management can be a time consuming but extremely important effort. This is where a managed patching provider can be an invaluable resource. If you were to conduct…