Get To Know Your Data with Purview Content Explorer

Get To Know Your Data with Purview Content Explorer The Challenge Many organizations have data governance on their minds to some degree. Some are actively working on initiatives to apply retention, data loss prevention, and other controls on the data in their tenant. More often, though, IT organizations struggle with where to start, and how […]

Why You Should Back Up Microsoft 365

Why You Should Back Up Microsoft 365 Before I was a consultant, I spent 20+ years managing all manner of technology groups and functions. Backup was always core to any system decision or implementation just like networking, security, or storage. Most of the time I made sure there was a backup plan before there was […]

Improving 911 Calling for Remote Workers

Improving 911 Calling for Remote Workers Introduction The goal of the RAY BAUM Act is to automatically route 911 calls to the appropriate Public Safety Answering Point (PSAP). This requires that the telephone system handling the 911 call be able to determine or ascertain the caller’s accurate current location. Microsoft Teams will determine if a […]

File Sharing: Why You Need To Do It Now!

File Sharing: Why You Need To Do It Now! In today’s digital age, one of the most popular tools for document management is Microsoft SharePoint, a collaborative platform that allows organizations to store, share, and manage their documents in a secure and centralized location. I’d like to discuss the benefits of using SharePoint document libraries […]

CIS Security Controls and Compliance

CIS Security Controls and Compliance Cybersecurity is a persistent worry for CIO’s, CISO’s, Board of Directors and organizational leaders. CIO’s and CISO’s specifically are expected to provide leadership and direction to their IT staff and their broader organization to strengthen cybersecurity postures. Where To Begin One question I have been asked by clients is, “where do […]

Copilot Coming to Microsoft 365

Copilot Coming to Microsoft 365 By now you’ve seen the previews of Microsoft’s unique capabilities using large language models within Microsoft 365 Apps like PowerPoint and Excel. Known as Copilot, it’s generating a lot of buzz amongst fans and critics. This blog summarizes some of the more subtle advantages of the technology, timelines of when you […]

How Government Institutions Can Manage Cyber Insurance Increases

How Government Institutions Can Manage Cyber Insurance Increases Growing trends and recent news have shocked the cyber insurance system. With cost and coverage changes, government institutions are simply seeking to attain reasonably affordable cyber insurance. This blog summarizes a spirited debate amongst subject matter experts on the topic in January 2023. Contributors include a former .gov […]

Managed Security Services Improve Security & Your Team’s Value

Managed Security Services Improve Security & Your Team’s Value The Power of MSSPs When I was leading technology organizations, one of the most critical and valuable partner vendor relationships was with our managed security service provider (MSSP). They served in three capacities: Around-the-clock 24/7/365 monitoring for malicious activity, including proactive threat hunting. Served as the […]

Defuse the Technical Debt Time Bomb

Defuse the Technical Debt Time Bomb While it has certainly been in the news more often lately, technical debt has been a challenge for organizations since the days of vacuum tubes.  Other than the recent air travel examples in the last few months, there is a constant stream of articles about health care providers, colocation […]

The Pros and Cons of Threat Hunting

The Pros and Cons of Threat Hunting Assuming Breach Stealthy supply chain attacks like Solorigate and Log4j have shined a light on the importance of assuming breach. When these attacks hit the news, vendors and analysts often suggest to “hunt for Indicators of Compromise.” IT and security pros spend nights and weekends determining the extent […]