
Configuring Compliance Rules in Microsoft Teams
Moving your data and applications to the cloud is one thing Maintaining compliance too is something else altogether and many SMBs and organizations ...

Using Azure DevOps for IT Management (VIDEO)
Using Azure DevOps for IT Management - Leverage Azure DevOps for effective IT management, automating processes for building, continuous testing, and deployment, even if you're not part of a software development team....

HIPAA Compliance in Microsoft 365
Businesses that deal in healthcare know the importance of HIPAA and HITECH compliance Violations of the privacy and security rules can result in larg...

Phishing Attack Simulator with Microsoft Security Center (VIDEO)
Phishing attacks are the most common method of credential theft, with a low barrier to entry (You don't need to know much more than how to make a web page and write an email) and ever increasing sophistication. This morning, one of our ...

Patch Tuesday: Resources
The patches that companies release for their products enhance the security and functionality However this does not make them any less of a hassle A...

Zero Trust Security Part 2: Implementing with Microsoft 365
As explored in detail in Part 1 of this Zero Trust Security series the standard castle-and-moat, perimeter-styled network defense has been rendered practically useless in this new era of cloud computing, mobile devices, IoT, and other technologies...