Blog

This Is Why You Need To Worry About Smishing

When we described Social Engineering Attacks, we talked about phishing (cyber attacks carried out using email). Phishing is all about convincing you to act immediately by clicking on a link, or opening an attached document, and results in a hacker getting access to your sensitive business or personal information. If you follow the few simple rule...

What You Need To Know About Microsoft 365

The big news at this week's Microsoft Inspire event is the announcement of Microsoft 365 – a way for companies of all sizes to have the same centralized IT administration, cyber security, and data protections previously available only to big organizations. Microsoft 365 simplifies managing all your connected devices and services while enhancing th...

What You Need To Know About Microsoft 365

The big news at this week's Microsoft Inspire event is the announcement of Microsoft 365 – a way for companies of all sizes to have the same centralized IT administration, cyber security, and data protections previously available only to big organizations. Microsoft 365 simplifies managing all your connected devices and services while enhancing th...

How to Save Time Using MyAnalytics And The Cloud

As a certified facilitator, I have the privilege of enabling the attendees of our free Amaxra Customer Immersion Experience sessions to get hands-on with solutions that truly help them be more productive. It's always fun to see their faces light up when they discover tools and features in Microsoft Office 365 they didn't even know were available. One ...

That Doesn't Look Like SharePoint

As a consultant who has earned her bread and butter from SharePoint gigs, I am very familiar with many people's perception of the Microsoft SharePoint collaboration platform. For every deployment, there are the supporters and the reluctant – the ones that used an old, ungoverned, or otherwise clunky version of SharePoint or ones who want the new, ...

How Better Mobile Apps Make You More Productive

More than ever, the modern workforce is unshackled from desks in an office. Thanks to smartphones, nearly-ubiquitous Internet access in most populated areas, and the cloud, the "work from anywhere" dream is basically now a reality. Mobile working is quickly becoming the new normal, with analysts predicting that 72 percent of the United States' tot...

Instant Efficiency Gains With Updated Active Directory Data

Millions of businesses around the world either have used or are using Microsoft Active Directory (AD) services on their corporate networks. Used to identify and manage authorized network users, AD has been around for over fifteen years. However, few companies take full advantage of AD's capabilities in the social media age. With a few simple tweak...

Which is worse: #ransomware or hard drive failure?

It’s a trick question. Both impact your business the same way – you lose access to your valuable business data when you are not expecting it. One of the most important things you can do about cybersecurity is to stop thinking about it like a mysterious disease whose only cure is to buy specialized protection software. To be sure, some businesses that...

7 Common-Sense Cyber Protections That Really Work

We all use the Internet regularly to communicate with colleagues, share vital information, and carry out our business duties. Think of trying to get through your workday without access to your e-mail, your documents, or your spreadsheets. Nevertheless, that same Internet we depend upon is viewed by cyber criminals as a pathway into your company – one ...

The Walled Garden

Safety in numbers. It is a proven survival principle that has, well, survived for eons. Encapsulated in this principle are many worthy lessons, such as implicit trust and resource pooling. These lessons are easily seen in the security concept of a Walled Garden. This defense model can be traced back to when 17th century townships were designed aro...