In our first installment, we discussed the importance of backing up your data. Without a good backup, chances are you might never see your data...
Ransomware basics: Part 1
There are many articles on ransomware. Many are trying to convince you that if you buy the products they mention, you can prevent ransomware attacks....
Office 365 help desk delegation with O365 Manager Plus
While Office 365 lets you work from anywhere around the globe, the management features it provides are often insufficient. When an organization is spread across multiple...
5 crucial facts that you must know about identity and access management
IAM is IT-centric. Identity and access management (IAM) may appear easy to some, but in reality, it is very tricky. Proper IAM is the key to...
Single sign-on (SSO) for the cloud
Nearly every organization has some cloud-based application. Of course the common cloud apps include Microsoft Azure, Office 365, G Suite, those from Zoho and Salesforce,...
5 things to keep in mind before backing up your VMware virtual machines
The architecture of a virtual machine differs vastly from traditional on-premises environments, and requires different data backup techniques and pre-backup operations. This post will explain some of the...
Approval workflow: Supervise self-service in Active Directory
Are you comfortable giving end users the power to update their own information in Active Directory? Definitely not! Are you willing to take on the responsibility of updating user information and managing users’ passwords? Not only is this a daunting task,...