When Microsoft introduced the Cloud Management Gateway (CMG) for Microsoft Endpoint Configuration Manager (MECM), there was only one supported...
[Case Study] Helping One Global Private Equity IT Department Stay Lean, Unseen, and Focused
In endpoint management, the less you're noticed by end users, the better that you're doing at your job. And when you're a global Private Equity firm...
Laying The Foundation For UEM: Initial Management Infrastructure Maturity (Level 1)
Welcome to the second article in our series on Unified Endpoint Management: Laying The Foundation For UEM: Management Infrastructure Maturity Level...
Why Are Dynamic Collections So Cool? How to Create/Filter a Collection Based Off Naming Standards for Windows 10 Machines
Collections in SCCM are great! The Microsoft definition of a collection is as follows: Collections are groupings of users or devices. [You] Use...
Level 300 Co-Management | A Step-By-Step Troubleshooting Guide [2021]
Troubleshooting Microsoft Azure AD Sync Issues First, make sure that the device is properly joined to Microsoft Azure Active Directory. If the...
All Recent Posts
Top Cybersecurity Challenges in Manufacturing and How to Overcome Them
In manufacturing, keeping your production line running smoothly and safely is the top priority....
Virtual CISOs: A Strategic Asset for Meeting Legal Cybersecurity Benchmarks
If you’re a managing partner, principal, or senior IT staff at a law firm, an intentional,...
How Law Firms Can Use AI Tools & vCISO Platforms To Mitigate Emerging Threats
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.