The Cybersecurity Risks Of Remote Employees Working From Home

The Cybersecurity Risks Of Remote Employees Working From Home

The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers. For years, companies have been gravitating towards new policies on the acceptance of remote employees. In...
Configure ‘Break Glass’ Emergency Access For Azure Active Directory

Configure ‘Break Glass’ Emergency Access For Azure Active Directory

In cloud computing generally and in Microsoft Azure specifically, the shared responsibility model means that both Microsoft and you (the customer) have a role to play in ensuring service high availability. Let’s take identity, for example, Microsoft provides...
File Transfer Protocol (FTP) Vs. Managed File Transfer (MFT)

File Transfer Protocol (FTP) Vs. Managed File Transfer (MFT)

This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational. You’ve probably heard the axiom, “In an information economy, data is king,” and know that data theft has become a...
Using Microsoft Flow To Automate Common Business Workflows

Using Microsoft Flow To Automate Common Business Workflows

With the thousands of cloud services out there, chances are you use many of them. Whether it’s using Gmail to send email, DropBox to store and access files, Google Docs to create and share docs or Slack to chat with coworkers, cloud services are incredibly...