Best CSP Security Practices

Best CSP Security Practices

We, like most CSP’s get leads directly from Microsoft. These leads generally consist of potential customers looking for Cloud products, email security, and professional services related to Microsoft. Occasionally we will get a lead from a customer that has used a CSP...
Where would Office 365 be without Excel

Where would Office 365 be without Excel

This week I spent some time reflecting on my life from the standpoint of technology, and I found a best friend. My first memory of using Microsoft Excel was in middle school science class. I was learning about the probabilities of certain traits being inherited. To...
Useful Keyboard Shortcuts

Useful Keyboard Shortcuts

Throughout my job experiences, I have been surprised to see coworkers highlighting a word or phrase, and right clicking to copy and paste somewhere else. I recently graduated with a degree in a technology related field where coding was part of my curriculum. This is...
On-Premises Exchange Servers Attacked

On-Premises Exchange Servers Attacked

Some of you may know of HAFNIUM if you took a chemistry class in school. In this context however, HAFNIUM is a group of state-sponsored hackers targeting On-Premises Exchange Servers utilizing a series of zero-day vulnerabilities. As many as 30,000 organizations have...