Security and Compliance

Explore related topics in this category

Power Automate for Executives – Coffee With Conrad

Power Automate for Executives – Coffee With Conrad

The following post is a recap of an episode of Coffee with Conrad in which we discuss how Power Automate can be leveraged by executives in minutes t...

AAD Privileged Identity Management - Coffee with Conrad

AAD Privileged Identity Management - Coffee with Conrad

The following is a recap of Agile IT's second episode of Coffee with Conrad, where we explored Azure Active Directory's Privileged Identity Management Functions...

When Should You Use Azure AD Connect?

When Should You Use Azure AD Connect?

Identity management gets complicated when your organization has both cloud and onpremises applications and data If employees have separate authentic...

NSA Guidance on Telework Solutions

NSA Guidance on Telework Solutions

As more businesses turn to software that enables online collaboration the specific application those companies choose for that collaboration becomes ...

CISA Security Recommendations for Office 365

CISA Security Recommendations for Office 365

The Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency CISA has released an alert as an update to its May 2019 Analy...

Compliance in GCC High, GCC and Microsoft 365 Commercial

Compliance in GCC High, GCC and Microsoft 365 Commercial

Simply having GCC High GCC or Azure Government does not meet any compliance framework all by itself This should go without saying but NO platform ...

Empowering Remote Workforce with Windows Virtual Desktop

Empowering Remote Workforce with Windows Virtual Desktop

In October only about52targetblank relnoopener noreferrerof the nations office workforce was working from home This number was slowl...

Securing the Remote Workforce

Securing the Remote Workforce

In todays professional environment its never been more important to have a secure remote workforce There was a time when working remotely remained...

How Social Engineering Hacks Are Caught With Network Security

How Social Engineering Hacks Are Caught With Network Security

Social engineering is by far the most insidious type of hack to ever be used against a business The worst part is that hackers arent even pitting th...

Zero Trust Security to Protect Remote Workforces During COVID-19

Zero Trust Security to Protect Remote Workforces During COVID-19

What is Zero Trust Security ZTSZero Trust Security was still considered a buzz word when we first wrote about over a year agonewsplannin...