Blog

blog

IoT Device Security

IoT is a huge topic, especially for enterprises. Many have been doing it for years, and many more are interested in doing it for the first time. Companies like Target have proven that it is often these smaller and non-obvious machines that are being used to penetrate systems and cause havoc or steal information. Utilizing an air-gap or analog segregations only make manipulations more difficult to detect. Microsoft has created a very robust set of Azure services to mitigate any qualms about using their cloud services, but what about their connected devices? Could an infiltrator access these to penetrate the system, or modify their programming to cause malicious damage?

Carl Schweitzer by Carl Schweitzer

CRM Tip: Comparing Security Roles with Photo Editor Layers

Comparing security roles in Dynamics CRM can be a major hassle, and take quite a long time to identify exactly which items are different. Here's a quick tip that can be used to overlay the roles on top of each other so it's immediately apparent which permissions are different.

Dan Fink by Dan Fink

Mandatory Anonymous Link Expiration in Office 365

Microsoft recently released a new feature in Office 365 which allows a mandatory expiration length to be set at the tenant level. This will affect sharing documents through SharePoint Online and OneDrive for Business.  This post will provide the steps to configure this setting.

Drew Madelung by Drew Madelung

Topics