IT operations management and observability | May 15, 2020How important is network compliance for your remote work environment? With a majority of the workforce now adopting a work-from-home routine, maintaining the...
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
Mobile Device Manager Plus | May 14, 2020How implementing a BYOD initiative helps prepare remote workers for COVID-19 era challenges As the COVID-19 pandemic continues to force employees to work from home, businesses are...
General | May 13, 2020Cybersecurity use cases for better remote workforce management Credits- Illustrator: S Amirthalingam In the new normal, if your business has chosen...
Patch Manager Plus | May 13, 2020May Patch Tuesday 2020 fixes 111 vulnerabilities As IT administrators do their best to cope with business continuity plans, it's imperative...
Patch Connect Plus | May 12, 2020Simplify third-party application management on Intune with Patch Connect Plus For organizations using Microsoft's System Center Configuration Manager (SCCM) who are...
Security Information and Event Management | May 11, 2020SQL Server, Part 3: Adopting the principle of least privilege In the previous blog in this series, we discussed authentication and authorization...
M365 Manager Plus | May 11, 2020The Office of Inspector General's Office 365 audit checklist [Free e-book and webinar] Over the years, Microsoft has worked with federal agencies and contractors to ensure its...
General | May 8, 2020Five worthy reads: Multiexperience: The next milestone in the digital transformation curve Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Endpoint Central | May 8, 2020Security configurations—Part two: 8 imperative security configurations for your arsenal In part one of this two-part blog series, we discussed seven reasons security...
Applications Manager | May 7, 2020Redis monitoring 101: Metrics to watch Redis, which stands for Remote Dictionary Server, is an open source, in-memory data...
Endpoint Central | May 6, 2020Security configurations—Part one: 7 reasons why security configurations are crucial to your security blueprint Security configurations are security-specific settings used to secure heterogeneous...