February 7th, 2019
February 7th, 2019
After you’ve [decided on a secure password policy] that fits your company’s security needs, it’s time to actually implement your new secure password policy on your network.
On a Windows Active Directory domain, we’ll do this by editing the Default Domain Policy Group Policy Object (GPO). This will enforce the new secure password standards for all user accounts in your domain.
Passwords are like the keys to your company’s network. Your users use them to log in to computers, access email, and connect remotely via VPN. And just like the key to the front door of your offices, a password in the wrong hands can allow unwanted “visitors” into your network -- where they can steal confidential information, destroy data, and expose your company to liability.
Despite a relatively no-frills platform, Dropbox has remained one of the most recognizable names in cloud storage. Apparently after nearly ten years in the market, it’s ready to move on to bigger and better things. Titled ‘Paper,’ the company’s newest service will take direct aim at Google Docs and Office 365 by offering real-time document […]
The ocean has a strange way of making you feel so small; so does a Twitter account with virtually no followers. It does become quite hard for your small- to medium-sized business to establish a strong online presence when they are surrounded by singers and supermodels with their own collection of trending hashtags.
As the saying goes, “absence makes the heart grow fonder.” If oceans were to separate you from your loved ones, what would you do? Would you communicate as much as you used to? Would you still check in from time to time? Now, apply this sentiment to your business; what would happen if communication with […]
Remember when spellchecker became widely popular in the late ‘70s and was considered a lifesaver for many people using word processors? You may ask “What does this have to do with Office 365?” The point is new technological features continue to transform the way we work, saving us both time and money.
According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves — social engineering.
Unlike shopping bags, a keyboard can come with an array of options. They range from ones built for typing efficiency to joint-friendly models sculpted for ergonomic usability. Considering the myriad of options, you might struggle deciding on what you should look for.
The art of organizing a meeting is much like chess. Each player has different possible moves, or availabilities; and it’s up to you to strategize which pieces to move where, or which events to schedule (or reschedule) when. The objective is to land on a square wherein all participants can attend, but achieving this goal […]