#Security #LinkedIn turn on #2FA its really straight forward and I would suggest it's a "must" to protect yourself/ LinkedIn account. Rather than recreate the wheel, I found this useful…
VMware vExpert Award 2020
Fantastic news! Today I received confirmation I have been given the VMware vExpert Award for the 5th year in a row. Its great to be part of the vExpert awards…
Account Hack / Phishing Email Alert / #IR35
Be careful, if an email account has been compromised, you might receive a genuine looking email which will pass through your spam filter. As an example, I have just received…
WVD – Windows Virtual Desktop – Admin Tasks, Tips and Useful Blogs
Windows Virtual Desktop: The Best Step-by-Step Walkthrough Windows Virtual Desktop - Add/Remove Users by AD Group using Azure Automation WVD Troubleshooting Options Tips Tricks – Windows Virtual Desktop Windows…
Office 365, Legacy Applications and MFA
Some legacy applications don't support MFA. This is a solution to enable the apps to continue to function when MFA is enabled for a user in Office365. How to create…
Social Media Tactics
Some note of social media tactics When writing blogs or posts on social media always include Keywords - Make sure you post has keywords on the topic Do social media…
Teaming up today with a post from MindofaRaptor.com
www.MindofaRaptor.com Cyber Security/Hacker Operating Systems I was recently informed of a new operating system that helps cover all of the security needs for those working in the Cyber Security industry,…
Office 365 – Security (Part 1)
Have you setup MS Office 365? Did you start with security in mind? Have you reviewed your Security and privacy settings? Nothing is configured out of the box. When implementing…
Azure Administrator – Tasks and Guides
Your one stop shop for the Azure Administrator resource pool of tasks. Task Set the tenant, subscription, and environment for cmdlets to use in the current session. Plan virtual networks…
Stuart Barker – ISO 27001 – What Does it cost?
Stuart Barker ( The Data Security Guy) discusses data security and how it comes at a cost. There is a difference between being secure and demonstrating that you are secure.…