Internet of Things: Are You Protected? 

Internet of Things

Internet of Things: Are You Protected? Simply put, the Internet of Things (IoT) are smart objects and can range from home devices (like Alexa) to complex industrial machinery and transportation systems. It is a network of physical devices or objects that are embedded with sensors, software, and network connectivity that allows them to collect and share data.   How many people do you know who use some sort of smart device? My guess would be many. You yourself are likely to use some sort of smart device or technology. But have you stopped to think about the security risks associated with using these devices?  How Does the Internet of Things Work?  … Read more

Enhancing Remote Work Security with Global Secure Access (GSA) and Conditional Access Policies  

Global Secure Access

What Is Global Secure Access? Working remotely has become the norm for many people. Nowadays, people work from nearly anywhere, which makes network security even more important. Global Secure Access (GSA), available as a preview feature in the Microsoft Entra Admin Center, provides a solution for secure access to your apps and resources using Microsoft’s Security Service Edge (SSE).   Global Secure Access (GSA) can be used to control network traffic between endpoint devices and the internet. Capabilities of GSA include web content filtering, M365 traffic control, and can even act as a VPN for your private, corporate resources. The GSA client is installed on endpoint devices and helps forward network … Read more

Co-Develop in Power BI Desktop: Creating an NHL Draft 

In May 2023 Microsoft announced Fabric, an end-to-end, human-centered analytics product that brings together all an organization’s data and analytics in one place. Accompanying the announcement of Fabric are features that improve Power BI’s relationship with Developers. One such feature is the improved co-development experience.  How Are Several Developers Able to Work together in Power BI?   Until these recent announcements, it was difficult for more than one developer to work on reports or datasets in Power BI, and it was easy to overwrite someone else’s changes, resulting in lost work. Furthermore, when searching for a previous version of a report or attempting to re-deploy an accidentally deleted report on the … Read more

Extending SharePoint Using SharePoint Framework (SPFx) and Custom Development 

While SharePoint’s modern experience provides impressive functionality updates and improvements, there are still several reasons why clients may want to further extend those features or add new features that will better facilitate their organizational needs. This can be as simple as adding a new web part displaying calendar events differently to more complex full custom solutions that integrate multiple 3rd party systems to push and pull data in and out of SharePoint.  We can perform these tasks using the SharePoint Framework (SPFx) to customize existing features or build new features of our own. This framework allows us to keep it simple using only JavaScript or provides the option to combine … Read more

Converting Angular to Blazor: What is Blazor, and Should You Make the Switch? 

Blazor is a somewhat new web framework used to create interactive web applications with ASP.NET and build web UIs using C# as the primary technology. The option to use JavaScript remains, but the primary language is C#. It’s recently had a bit of buzz in the tech world and people are interested in what it can do. The purpose of this blog is to highlight some of the benefits and why you might want to consider converting from Angular to Blazor.  Benefits of Blazor:  Drawbacks to Converting to Blazor:  Because Blazor is relatively new there are going to be some drawbacks. It’s important to consider these limitations to choose the … Read more

Are You Cyber Safe? Protect Your Microsoft 365 Products from Online Threats – Part 2

Last week, we published a blog that provided tips for protecting your Microsoft 365 products against malicious cyber threats. Cybersecurity is not something to take lightly, and with technology constantly evolving, it is important to understand how you can protect your organization’s sensitive information.   There is no such thing as being overly cautious or engaging in too much cyber security. We recommend doing everything you can to protect your organization’s online information. Online threats are lurking everywhere, and far too many people adopt an “it will never happen to me” mentality. The reality is it can happen, and it does, so it is always best to diversify your safety … Read more

How Number Matching in Microsoft Authenticator Impacts Cybersecurity

Learn how Microsoft is using number matching in their Authenticator App to improve the security of personal information. Discover how number matching is one of the best ways to enhance your organization’s cybersecurity and reduce risks of online threats.