Articles

Trench Tales: Using Intune for mobile device management of privately-owned devices

If your employees use their own mobile devices at work, mobile device management is a must. Fortunately, Microsoft Intune makes…

2 days ago

An absolute beginner’s guide to Microsoft Hyper-V revisited

Want to take the plunge into virtual machines? This guide for Microsoft’s Hyper-V will get even beginners up-and-running faster than…

3 days ago

Still running Skype for Business? Time to upgrade to Microsoft Teams

Skype for Business may have served you well, but it won’t serve you at all after July 31. So, make…

3 days ago

Five CISO challenges that must be faced in an increasingly risky world

The CISO is the pinnacle of a career in information security. To be successful in this role, one must overcome…

4 days ago

What happens when a big partner like Microsoft wants your clients?

An IT consultant and MSP’s conundrum: What should you do when a partner tries to sell direct to your clients?…

4 days ago

Cybersecurity dangers when an employee goes on leave

While going on leave is good for both organization and employee, there are cybersecurity dangers that emerge when a worker…

5 days ago

Top five complaints from remote workers — and how to respond

While many work-from-home employees enjoy the new normal, it is not without its hurdles. These complaints from remote workers should…

5 days ago

Data privacy regulations: Walking safely through the compliance jungle

Can businesses have a sustainable data privacy policy in a world where ever-changing compliance requirements make adhering to regulations a…

6 days ago

Troubleshooting ‘Outlook cannot connect to server’ error

"Outlook cannot connect to server" is a common error that prevents you from sending or receiving emails. Let's see how…

1 week ago

Kubernetes security: Protecting apps from unpatched vulnerabilities

As Kubernetes grows in popularity, security becomes a major concern. But what if a vendor doesn’t release a patch for…

1 week ago