How I advise my clients on compliance & security

29. June 2017 Business, Technical 1
Information Security is becoming more and more important in today’s world. Here in the North America (including Canada and the US), we have several laws that require us to meet certain compliance requirements as it relates to Information Security for various industries.  Other nations, such as those belonging to the European Union, face these challenges as ...

Soft (SMTP) vs. Hard (immutableID) matching with Azure AD Connect

08. June 2017 Technical 0
If you are setting up Directory Synchronization from scratch (there are no users in the cloud yet), then Azure AD Connect will be pretty straightforward–the on-premises objects (and passwords if you choose that option) will be synchronized to the cloud, and you can assign services to the user accounts from there. But what if you ...

My Essential Checklist for Settting up any New Windows 10 Pro Device

01. June 2017 Technical 0
This post features the things I do when setting up any (personal) Windows 10 Pro device, whether it’s for myself, my family members, clients, or anyone really. I usually do these things with security / compliance in mind–but some of it comes down to preference (I think the differences between these will be obvious). Let me share ...

How to manage permissions with Active Directory (the right way)

25. May 2017 Technical 0
How do most people use Active Directory groups to manage permissions?  You probably already know the answer: Global security groups. For example, if there is a directory on the file server specifically for “Payroll,” then we normally see folks creating a Global security group that corresponds to “Payroll,” populating that group with the users who ...

5 Tips to Help Tighten your Security Using BIOS/UEFI

18. May 2017 Technical 0
In the olden days of PC’s, BIOS or “Basic Input-Output System” was something only the nerdy computer geeks were aware of, and the typical user never really went in there, or ran any kind of updates for it, unless explicitly instructed to by a support professional. Usually getting into BIOS is achieved by pressing “Delete,” ...

Password best practices

04. May 2017 Business, Technical 0
Some people say passwords are dead. I don’t know if I 100% agree with that, since in actual fact and practice, we still rely on them heavily to secure access to our personal information online. The idea behind these “passwords are dead” sentiments is that a single factor of authentication is no longer “enough” on it’s own. ...

How to enable 2-factor or multi-factor authentication (2FA or MFA)

27. April 2017 Technical 1
Enabling a second factor for authentication is an important (and often very easy) thing to do.  Usually this can be accomplished in just a few clicks for most websites and cloud services. It is highly recommended that you take the time to do this, especially for any accounts that are tied to online banking, financial institutions, and ...