Microsoft

#
While Microsoft gave advanced warning that Windows 2012 would be going end-of-life on the 10th of October and other hardware is now well due for replacement, many businesses may not have given advanced thought as to how they will adapt their systems from the outdated server.
Read More >
#
This month's questions are about – you guessed it – security: texting apps, losing your laptop, and more.
Read More >
#
There are a ton of passwords we all have to manage and if you are following these three best practices, you change your passwords quarterly, your password is 12 characters + in length, and you do not use the same password on multiple sites. Managing and remembering your passwords is daunting!!
Read More >
#
The growth of cloud computing has completely changed how we work. Zoom, Microsoft 365 – the whole array of collaboration tools that have become part of daily life over the past couple of years – these are all cloud-based applications that many of us would not want to do without. But security in…
Read More >
#
Read more for quick answers on video meetings, employee productivity, IT spend, and more.
Read More >
#
Last fall, Microsoft introduced support for number matching to its Authenticator app. The company announced on the Microsoft 365 admin center that the new security feature would be enabled by default for all Microsoft Authenticator users worldwide in May 2023.
Read More >
#
The web browser you choose can have a big impact on your online security. And as a business, it is important you do not take any unnecessary risks, even if you are someone who likes to steer clear of the IT megabrands.
Read More >
#
Get answers to some common questions about Windows, Microsoft Office, and more.
Read More >
#
There are some significant dates in 2023 for hardware and software reaching end of life or end of support. Reviewing these before the year starts will not only help you plan for updates and replacements, but budget properly for next year.
Read More >
#
Multifactor Authentication (MFA) is a must for an organization’s cybersecurity portfolio, but for many this simply means Two-Factor Authentication (2FA). As cybercriminals continue to advance their means of attack, they have developed sophisticated ways to circumvent 2FA.
Read More >