Leveraging Microsoft’s Identity Platform to Secure Your Business Over the past few weeks, we’ve covered a broad range of security-focused basics that you can implement to strengthen your security posture. Today, we’ll dive deeper into strengthening your Microsoft...
Networking Fundamentals in the Cloud Networking fundamentals remain essential whether on-premises or in the cloud. While the terminology might change, the core concepts often stay the same. In Azure, a VRF is similar to a VNET, a VLAN is now a subnet, and an ACL is...
For the past 7 years now, Hyperconverged Infrastructure (HCI) has been gaining traction with customers with a on-premises data center requirement for their business. 2018 was a watershed moment in that more customers than ever chose to replace their existing “Compute...
With O365 and its supporting office applications now mainstream, new integrations and migrations are becoming more common place. One we are seeing more of is the consolidation of multiple O365 tenant environments into a single environment. For instance, COMPANY A...
5 Beginning Steps to Ensure You’re Protecting Your Data from Ransomware A quick Google search on recent ransomware stories will highlight the sad state of our current world. Our data has monetary value, and those who can hold it hostage are often able to extract a...
Like most things in tech, the consumer experience drives corporate adoption. Well, in the case of Multi Factor Authentication, we, as individual consumers, have seen the place text message verifications, phone prompts, and IP-based tracking provides a layer of...