Tech Thursday: Office 365 External Sharing Made Easy With Azure AD B2B

Last week, we discussed how to configure your organizational sharing settings to allow external collaborators on SharePoint and OneDrive documents. Up until now, if you wanted any kind of security or authentication of who you were sharing your documents with, the recipient needed to have either a Microsoft account or an Office 365 account from a different organization.

Phone service during the Pandemic

The working environment has changed drastically since March.

First you had to figure out how to do your work remote. It involved figuring out equipment, internet connections, VPN set ups, and pulling every file you think you might need from your office.

Tech Thursday: CMMC Update

We developed a comprehensive overview of the NIST 800-171 security controls that are expected to be the cornerstone of CMMC regulations.

Many small- and medium-sized businesses are anxious about when the new rules will be put into place. Additionally, you may be wondering what you can do now to prepare for the eventual rollout of CMMC and the new contract requirements that will stem from it.

Tech Thursday: Protecting Your Cloud Services

The COVID-19 pandemic has sent businesses scrambling to support their newly mobile workforce. For many of these businesses, this means they’re turning to cloud-based SaaS providers for collaboration, online meetings, and document sharing.

Unfortunately, this rush has meant that security problems have cropped up one after another.

Tech Thursday: Preparing Your Network for Working From Home

As the COVID-19 outbreak spreads and “social distancing” becomes a household phrase, many companies are organizing an unprecedented shift toward working from home. So this week’s Tech Thursday article will focus on how your company can provide the resources your employees need to stay productive during these events.

Tech Thursday: Tax Preparers – Protect Your Clients’ Data From These Scams

For the last few weeks, we’ve been examining the data protection guidelines that the IRS has laid out for tax preparers in IRS Publication 4557. First, we examined how tax preparers can comply with the Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA). Then we looked at some of the digital safeguards that tax professionals need to put in place to protect their computers and systems from hackers.

Tech Thursday: Safeguarding Taxpayer Data with IRS Publication 4557

Along with tax season comes an increase in taxpayer data theft and associated fraud. So, the IRS has issued Publication 4557 to help tax preparation professionals safeguard the data that has been entrusted to them.

Last week, we looked at the Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA) and why tax preparers need a written data security plan.