Last Update: May 07, 2024
When it comes to cloud services and security technology, IT and systems administrators should seriously consider having SSO implemented for greater convenience and security. What is single sign-on (SSO)? SSO is an authentication method that allows users to securely access multiple SaaS (Software-as-a-Service) applications, websites, and other digital resources with a single set of login…
May 13, 2024 Chester AveyAn often-overlooked element of security is the Web Application Firewall (WAF), especially in cloud computing. In this article, I explain what a WAF does, the different kinds of WAF, and I discuss why you should deploy one or more WAFs in your architecture. What is a Web Application Firewall (WAF)? A Web Application Firewall, often…
Last Update: May 10, 2024
Jun 20, 2023 Aidan FinnI recently spoke to Sean Deuby, who is Principal Technologist at Semperis and an Identity expert. Sean told me about the importance of protecting identities in the current landscape and how Identity Threat Detection and Response (ITDR) is a critical component of the Zero Trust security model. The emergence of cloud computing and the shift…
Last Update: May 10, 2024
Jun 16, 2023 Russell SmithEvery system administrator dreams of building the perfect Rube Goldberg machine of IT automation to manage the employee IT lifecycle, end to end, including IT offboarding. A new hire joins the company, HR files a ticket, and BAM! In an instant, all of the birthright accounts, access, and permissions are granted in a glorious cascade…
Last Update: May 10, 2024
Jul 21, 2023 Russell SpitlerThis post was Sponsored by Stellar Repair, you can learn more about their PST Recovery Tool here. Email is the de facto standard for today’s business communications. Businesses rely on email for personal communications, team assignments, announcements, and notifications as well as purchasing and other intracompany communications. This has been particularly true during the recent…
Last Update: May 10, 2024
Apr 7, 2021 Michael OteyWhen people talk about the security of data in Microsoft 365, invariably phrase you’ll hear – and I don’t know who coined it – “the cloud is just someone else’s computer”. When someone says it to me, I literally have to stop myself from saying “…but actually” before we both explode into memes. Microsoft 365…
Last Update: May 10, 2024
Apr 1, 2021 Steve GoodmanOur sponsor help us keep our knowledge base free.
An often-overlooked element of security is the Web Application Firewall (WAF), especially in cloud computing. In this article, I explain what a WAF does, the different kinds of WAF, and I discuss why you should deploy one or more WAFs in your architecture. What is a Web Application Firewall (WAF)? A Web Application Firewall, often…
Last Update: May 10, 2024
Jun 20, 2023 Aidan FinnI recently spoke to Sean Deuby, who is Principal Technologist at Semperis and an Identity expert. Sean told me about the importance of protecting identities in the current landscape and how Identity Threat Detection and Response (ITDR) is a critical component of the Zero Trust security model. The emergence of cloud computing and the shift…
Last Update: May 10, 2024
Jun 16, 2023 Russell SmithEvery system administrator dreams of building the perfect Rube Goldberg machine of IT automation to manage the employee IT lifecycle, end to end, including IT offboarding. A new hire joins the company, HR files a ticket, and BAM! In an instant, all of the birthright accounts, access, and permissions are granted in a glorious cascade…
Last Update: May 10, 2024
Jul 21, 2023 Russell SpitlerThis post was Sponsored by Stellar Repair, you can learn more about their PST Recovery Tool here. Email is the de facto standard for today’s business communications. Businesses rely on email for personal communications, team assignments, announcements, and notifications as well as purchasing and other intracompany communications. This has been particularly true during the recent…
Last Update: May 10, 2024
Apr 7, 2021 Michael OteyWhen people talk about the security of data in Microsoft 365, invariably phrase you’ll hear – and I don’t know who coined it – “the cloud is just someone else’s computer”. When someone says it to me, I literally have to stop myself from saying “…but actually” before we both explode into memes. Microsoft 365…
Last Update: May 10, 2024
Apr 1, 2021 Steve GoodmanThis Week in IT, I look at a new Microsoft Places app that it promises will help solve flexible work challenges for hybrid teams. The app lets you build connections and improve workplace experiences with intelligent technology, creating a hybrid work environment that’s responsive, cheaper to manage, and that gets results for your team. Thank…
Listen now LISTEN & SUBSCRIBE ON:In this episode of UnplugIT, hosts Darrell Webster and Stephen Rose delve into the latest updates and features in the new Microsoft Teams and Outlook clients. The discussion begins with an overview of Teams’ global rollout and the various enhancements aimed at aligning it more closely with Outlook, such as drag-and-drop calendar support and new…
Listen now LISTEN & SUBSCRIBE ON:Monitor, manage, and secure your IT infrastructure with enterprise-grade solutions built from the ground up.
Reduce time to recover AD after a cyberattack by up to 90%. With Semperis Active Directory Forest Recovery (ADFR), you’ll be back in business in minutes or hours rather than days or weeks.
Did you know data creation is at an all-time high? In fact, it is estimated that 1.7 MB of data is created every second for every person on Earth. As companies grow and adopt more digital tools, the volume of generated data continues to increase, making Data Sprawl one of the key hidden challenges for businesses.