Blog

Authentication 101 - Best Practices

I get asked for this all the time. Customers ask for the “Best Practices” for really complex subjects, sharing settings, site structure, things where, as a consultant, my answer almost always has to be ...“It depends.”   Complex subjects are very hard to apply best practices to, and the way that you know you are about to wander into that territory is when you find yourself asking  someone “What do most organizations do?”

Read more

How to Create, Publish, and Use Sensitivity Labels in Microsoft 365

We all want to know where our data is and who can see it, and most importantly we want to know without a doubt that people who shouldn’t see it can’t.  

Read more

Office 365 Security- A Plan

The tyranny of search engine optimization forced me to give this article that boring title, but honestly I wanted to call it “Rubber Baby Buggy Bumpers” . One of the big myths we have in the Information Technology world is that security is a mature and solved problem.  In reality we just want to get the baby buggy bumpers in place to keep us from hitting our heads on sharp corners, we have to keep watching for risks and adapting our plans as the landscape becomes clearer.

Read more

SkyDrive Pro Security and Governance on Office 365

 

Read more