Blog

blog

Fool me once-shame on the hacker. Fool me twice-shame on me!

In May, at least 200,000 organizations in 150 countries including hospitals, transformation systems and factories were infected with “WanaCrypt0r” ransomware-malware, a self-spreading virus which took advantage of vulnerabilities in the Microsoft server and desktop operating systems. 

Concurrency Blog by Concurrency Blog

Querying using Views

Today we look at a high level overview of using Views in your SQL queries and the implications behind them.

Nick Adams by Nick Adams

IoT Device Security

IoT is a huge topic, especially for enterprises. Many have been doing it for years, and many more are interested in doing it for the first time. Companies like Target have proven that it is often these smaller and non-obvious machines that are being used to penetrate systems and cause havoc or steal information. Utilizing an air-gap or analog segregations only make manipulations more difficult to detect. Microsoft has created a very robust set of Azure services to mitigate any qualms about using their cloud services, but what about their connected devices? Could an infiltrator access these to penetrate the system, or modify their programming to cause malicious damage?

Carl Schweitzer by Carl Schweitzer

CRM Tip: Comparing Security Roles with Photo Editor Layers

Comparing security roles in Dynamics CRM can be a major hassle, and take quite a long time to identify exactly which items are different. Here's a quick tip that can be used to overlay the roles on top of each other so it's immediately apparent which permissions are different.

Dan Fink by Dan Fink

Mandatory Anonymous Link Expiration in Office 365

Microsoft recently released a new feature in Office 365 which allows a mandatory expiration length to be set at the tenant level. This will affect sharing documents through SharePoint Online and OneDrive for Business.  This post will provide the steps to configure this setting.

Drew Madelung by Drew Madelung