You’ve Been Breached: Now What?

It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]

How to Spot a Phishing Attempt

Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]

Azure AD Connect – Connecting your infrastructure to the cloud

With the current direction the industry is heading, more and more IT environments are moving to cloud solutions. This means you need to use additional tools to keep your cloud and on-premise environments in sync to create a true Single Sign-On solution. In this article, we will be reviewing sync features of one specific tool Read more about Azure AD Connect – Connecting your infrastructure to the cloud[…]

Using O365 Mailboxes and Permissions

Office365 is a fantastic mail platform with many options. However, due to the large amount of options, certain features are often unexplored. Specifically, there seems to be a lot of confusion regarding O365 mailboxes. I frequently see offices paying for mailbox licenses when a different free mailbox could’ve been used. In this article I will review Read more about Using O365 Mailboxes and Permissions[…]