I DIDN’T RECEIVE ANY MAIL 

Posted Posted in Uncategorized

We all have that person whose office seems like a holiday in asthma-ville. All those bound musty papers, invoices, and receipts gathering dust in one corner of his/her office awaiting the coming of our lord auditor and almighty IRS. The cleaner knows well enough to not bother navigating the stacks due to the sensitive nature of the […]

Internet Security and you

Posted Posted in Uncategorized

Trade secrets account information, personal information- all these seem to be accessible once devices are connected to the internet. Because of the staggering amount of information flying around cyberspace, and the amount of damage it can cost emotional, financial, national securities if the knowledge is abused, restricting access to these same has topped the list […]

SERVER IS DOWN AGAIN… OR NOT

Posted Posted in Uncategorized

IT peeps attached to any organization that has on-premises server rooms would probably tell you their worst nightmares become a reality when the servers they maintain shut down. Nobody can access that organization from within and without. When that happens, everyone feels its effect. Companies lose billions in revenue for every minute it is off, […]

BOTS: THE FUTURE IS HERE

Posted Posted in Uncategorized

When I am prompted by Captcha(Completely Automated Public Turing test to tell Computers and Humans Apart), to type in the words I see while registering on a site or forgetting my password on another, I wonder why the site would even think it was anything but human that was trying to register, that’s probably the […]

Changes to Office and Windows servicing and support

Posted Posted in Uncategorized

Delivering a secure and productive modern workplace is a top priority for many of our commercial customers, and we’re committed to help. Last July, we took a big step forward in this journey with the introduction of Microsoft 365, a new product suite that brings together Office 365, Windows 10, and Enterprise Mobility + Security.  Many customers […]

5 Reasons the Certified Network Defender (CND) Certification Is Not an Ordinary Program

Posted Posted in Uncategorized

Cyber defense has become the focus of smart organizations everywhere as they try to ward off the financial and reputational damage that modern hacks can cause. Cyber breaches have increased 1,370% over the past 10 years despite an industry’s worth of best efforts to stay ahead of cybercriminals. In fact, many organizations are still struggling to implement […]

6 Skills Top Companies Look For When Hiring a Chief Networking Officer

Posted Posted in Uncategorized

Cyber defense has become very important to organizations of all sizes as cyber breaches can lead to reputational damage and massive financial and data losses. Despite updating programs and cybersecurity strategies, organizations are still falling victim to cybercriminals. To ensure the safety of an organization’s assets, companies must hire trained network defenders who will protect, […]

How Azure Security Center Guards your data against cyber attacks

Posted Posted in Uncategorized

In many situations, public cloud services allow a high grade of pliability, flexibility and charge effectiveness combined with standardization. On the other hand, every customer needs to build trust with the chosen platform and that all his services and data are protected against any attacks. So, it’s very fascinating to see, what kind of mechanisms […]

How to setup Multi Factor Authentication for your personal Microsoft Account

Posted Posted in Uncategorized

To secure a personal Microsoft Account (MSA”, formerly known as LiveID”), you can enable two-step verification (MFA” for Multi Factor Authentication) easily. This article shows the How-To. The Microsoft support article About two-step verification informs about the necessary steps. Secure your MSA I wanted to add MFA to an existing MSA *@outlook.com. To make it short: Open […]

Move resources in Microsoft Azure

Posted Posted in Uncategorized

It’s a not so well known feature, that admins can transfer services in Microsoft Azure to reorganize their cloud services. This can be accomplished in the Azure Portal or programmatically. See here, how this works. So, you can move services between resource groups and you can move services to another Azure subscription.This can be done in the (new) […]

Use Azure AD app principal without user context

Posted Posted in Uncategorized

For an application registered in AAD to be able to run in application context only without a user context the Company Administrator” role has to be assigned to the application in order to be able to access administrator endpoints for APIs like the Microsoft Graph. No additional permissions have to be assigned to the application […]