Resolving Excel Macro Issues Caused by Microsoft Security Baselines
Microsoft Security Baselines provide a set of recommended configuration settings for securing your environment. However, sometimes these settings can interfere with normal operations, causing unexpected issues. Recently, we encountered a problem where enabling the security baseline caused Excel macros to stop working. Here’s a detailed account of the issue and how we resolved it. The
Demystifying UPS & Battery Backup Specs
When it comes to picking the right UPS, here’s my rule of thumb: Buy one around $400. While I’m content to stand by this over-simplified advice, in this article I’d like to demystify what the specs mean when shopping for a UPS. But before we get into the numbers, let’s put the horse before the cart and define
7 Ingredients for Good Cybersecurity
It used to be that IT services providers would sell you an expensive firewall, install the “best” antivirus, do some kind of patch management, and call you secure. Covid changed all that. A hasty transition to remote work opened up a wave of vulnerabilities that allowed hackers to seize the moment, and seize they did!
Convergence of IT & Programming
When I tell people that I work in IT, they often assume that I know how to code. Programmers are an entirely different breed of nerds from IT professionals. You might say programmers are the creators, while we are the mechanics. We don’t create the programs – we provide and maintain the infrastructure to run them. However,
Canva: Easy Business Video Presentations in Under 1 hour
A new client recently asked me if we could produce a quick intro video that he could send out to his staff. It was a bit of an unusual request, since a quick email blast usually does the job… but my wife has been telling me for months how amazing Canva is, so I thought I’d
Getting Your Security DUCS in a Row (with Microsoft 365 Business Premium)
I was at a conference where I asked a group of IT professionals what they’re doing about security. I mentioned that we adopted Microsoft 365 Business Premium to protect our clients, and the general response was “you can’t trust Microsoft to protect Microsoft.” While I can empathize with that sentiment, the group didn’t have much
How Detailed Does HIPAA Policy and Procedures Need to Be?
The following is a conversation with our consultant, Ben Beninati, from Compliancy Group. Compliancy Group (https://compliancy-group.com) specializes in assisting medical organizations meet HIPAA compliance requirements. As an IT service provider, we fall under the Business Associate category, which means that we also need to be HIPAA compliant. As we go through Compliancy Group’s program, I’m noticing that
Easily Work with Files in Microsoft Teams
Microsoft Teams has quickly become the centerpiece of Microsoft’s cloud-enabled workforce, acting as the portal for all things Microsoft. Saving files to Teams has many benefits: Mobile access: Access your files without VPN Co-authoring: Multiple people can edit the same file at the same time AutoSave: No more lost work from computer crashes! File history:
Fox and the Hens: A Cybersecurity Story
You, the farmer, have a lovely den of hens, providing you with a daily supply of fresh eggs. It wasn’t long before the clever fox took notice. First, the fox jumped over the fence and made off with a few eggs. So, you built a taller fence. Next, the fox burrowed under the fence and made
Quick Network Tip: Ask for VeloCloud by name
As more business data moves to the cloud, the more important it becomes to consider having a backup Internet connection. Traditionally this was done through a firewall capable of having multiple WAN links. However, failing over to a secondary WAN link would cause your IP address to change, meaning loss of connectivity for VPN users
Freedom from Patch Management!
How long have you stayed up late night catching computers up on updates? How many times have you implored users to leave their computers on, only to be ignored? Dying in your beds, many years from now, would you be willing to trade all the days, from this day to that, for one chance –
Password theft, MFA, and the Evolving Cleverness of Hackers
If you ask me what’s the most important thing you can do for cyber security, the answer is easy: MFA (multi-factor authentication). Password theft remains the most common cause of cyber security breaches, and MFA is the best way to combat password theft. So it’s a real shame that we still get pushback from some
Categories
- ARM
- Automating Azure
- Azure
- Azure CLI
- Azure Pipelines
- Backups
- Bicep
- Compliance Policy
- Custom Compliance Policy
- Hardware
- HIPAA Compliance
- Internet
- Microsoft 365
- Microsoft Teams
- Misc
- Network
- Patch Management
- Power Supply
- Programming as an IT Professional
- Remote Access Solutions
- Security
- VNET
- VPN
- Windows 10/11
- Windows 365