Office 365
Download this guide to cybersecurity risk assessments to understand how best to calculate your risk exposure.
Over the last year, more and more organizations have opted to migrate their data to the Cloud to make working remote easier for their worker...
Enable your workforce to confidently return to on-site work by deploying Microsoft’s Return To The Workplace app. The app allows managers ...
In our workflows, we often need to perform file metadata updates, check-ins, moves, etc. If a file is locked and we do not account for it, it can fail our workflow entirely and prevent it…
In our first blog of this series, we discussed how entitlement management in Azure Active Directory (Azure AD) Identity Governance creates Access Packages to control the scope and duration of access to groups, applications, and…
For those using Zoom, hopefully you are carefully reconsidering your use based on the recent security concerns exposed. In this blog, I’ll review the features of Zoom relative to Teams to make sure users are aware of…
How Azure Active Directory (Azure AD) Identity Governance can assist your organization in responding quickly to new collaboration needs whil...
With the current COVID-19 pandemic impacting almost everyone these days, many organizations, groups, and people in general are trying to fin...
According to Techterms, an intranet is a “private network that can only be accessed by authorized users.” In reality, it’s a lot more ...
Microsoft Ignite 2019 has come to a close, but we’re recapping all the fun that was had with a round-up of the top takeaways, announcements, and moments at this year’s event in Orlando. This year’s…
One of the features in Microsoft 365 which can be overlooked is your User Profile. Delve User Profile pages contain a lot of information about your business users, including: Contact information About Projects Skills and…