<img alt="" src="https://secure.hims1nice.com/151009.png" style="display:none;">
" style="background-color: #2c3e50;">
 

Blogs

Does the SolarWinds breach have you searching for a new Systems Monitoring solution?

February 10 2021

System Center Operations Manager

The recent SolarWinds breach is in all the IT and news headlines. This has caused IT decision-makers to rethink/re-evaluate their current Systems Monitoring solutions if they are a SolarWinds customer. This is where a tried-and-true platform from Microsoft may be able to assist in the decision-making process.

Understanding the Limitations of Authentication Session Management with Conditional Access

December 4 2020

Understanding the Limitations of Authentication Session Management with Conditional Access

New to conditional access is session control where you can define sign-in frequency and persistent browser session. This requires Azure AD P1.

Benefits of Azure for Small to Medium Business

November 24 2020

Benefits of Azure for Small to Medium Business

Don’t Let IT Challenges Distract Your Business

November 23 2020

Don’t Let IT Challenges Distract Your Business

In today’s modern business environment, reliable digital infrastructure is essential and having access to real-time IT support is a resource that you can’t afford to live without. Fortunately, contrary to popular belief, you have cost-effective options that can provide some peace of mind.

Protecting Your Browser Session with Isolated Sessions

October 26 2020

What is Microsoft Defender Application Guard?

Attackers often hijack browser sessions to steal and/or manipulate data. In addition, they run malicious code to steal passwords, plant trojans, ransomware, and other activities to penetrate your network.

Auditing role assignments with Privileged Identity Manager (PIM)

October 19 2020

Auditing PIM

As a best practice, most security professionals recommend administrative users have two accounts - one for administrative tasks and a second account for all other tasks. This ensures that things like email that can be a vector for malware are kept separate from the account with administrative rights. Unfortunately, this creates a hurdle for many environments, in that the additional time and effort taken to manage and use two accounts for all administrative users becomes problematic.

Is Microsoft’s new Edge the right choice for your organization?

October 14 2020

Microsoft’s new Edge and Enterprise Mode

The new Microsoft Edge is a browser built for business. This Chromium-based browser offers many advantages over its predecessors and other browsers in the market today. So, is it the right choice for your organization?

Healthcare Security Demystified

March 26 2018

Securing Applications and Data

For both traditional on-prem solutions and cloud-based solutions, how should organizations act to secure their data and applications?

When talking with IT service providers working in the healthcare space, we’ve found a few concerns repeated:

  1. My organization has become heavily security conscious after the malware attacks, but we’re not sure where to focus.
  2. Our leadership wants us to adopt cloud infrastructure and platform services, but our security team is preventing that as they are not sure of the security.
  3. As our development teams are building products, such as SaaS offerings for clients or other solutions, we are not sure what modern tools work for managing the infrastructure and apps involved.

Collectively, these concerns all engage in the shared idea of security and operations. 

 

Your Operating System Could Be Killing Productivity

February 14 2017

Generally speaking, companies must weigh the pros and cons of upgrading or updating any system.  It is accepted that physical assets such as machinery or equipment must be maintained at specific intervals.  

Furthermore, the projected end of life date is typically established at the time of purchase.  Equipment kept in use past its projected EOL requires additional maintenance and upkeep and often hampers productivity or increases risk and most companies would not dispute this fact. 

Software systems are no less critical. Software applications and operating systems also have a projected EOL, but often the temptation to extend the service life of these assets is greater than for a piece of equipment that you can touch and feel. 

Website