Modern Work and Productivity

Explore related topics in this category

HIPAA Compliance in Microsoft 365

HIPAA Compliance in Microsoft 365

Businesses that deal in healthcare know the importance of HIPAA and HITECH compliance Violations of the privacy and security rules can result in larg...

Phishing Attack Simulator with Microsoft Security Center (VIDEO)

Phishing Attack Simulator with Microsoft Security Center (VIDEO)

Phishing attacks are the most common method of credential theft, with a low barrier to entry (You don't need to know much more than how to make a web page and write an email) and ever increasing sophistication. This morning, one of our ...

Patch Tuesday: Resources

Patch Tuesday: Resources

The patches that companies release for their products enhance the security and functionality However this does not make them any less of a hassle A...

Zero Trust Security Part 2: Implementing with Microsoft 365

Zero Trust Security Part 2: Implementing with Microsoft 365

As explored in detail in Part 1 of this Zero Trust Security series the standard castle-and-moat, perimeter-styled network defense has been rendered practically useless in this new era of cloud computing, mobile devices, IoT, and other technologies...

Upgrading from Skype for Business to Microsoft Teams

Upgrading from Skype for Business to Microsoft Teams

Microsoft has been revamping all aspects of its Skype line The biggest change is in Skype for Business It isnt going away yet but Microsoft is str...

Communication Habits of Highly Successful Remote Teams

Communication Habits of Highly Successful Remote Teams

Remote work is more popular than ever According to the stylefontweight 400Bureau of Labor Statisticsstylefontweight 400https...

Active Directory Health Checks (Video)

Active Directory Health Checks (Video)

Active Directory Health Checks were the topic of September 20th's Agile IT Tech Talk, where we welcomed Miguel Escalante, the new Cloud Solutions Engineer on the Agile IT Team. Joined by Conrad Agramont, the two discussed how to identify an ailing Active Directory, what causes specific faults, and how to fix them...

A Guide to Planning Zero Trust Architectures - Part 1

A Guide to Planning Zero Trust Architectures - Part 1

The days of castleandmoat cybersecurity are over At least theyshouldbe over The old model is no longer cutting itnot even close Across the...

12 Microsoft 365 Apps You’re Not Using Enough

12 Microsoft 365 Apps You’re Not Using Enough

When youre using software especially complex suites loaded with apps its easy to slip into the path of least resistance You tend to lean on the a...

Office 365 Educational License Comparison: A1 vs A3 and A5

Office 365 Educational License Comparison: A1 vs A3 and A5

Microsoft has become the foundation of most educational institutions Communication and scheduling are handled through Outlook Documents are created ...