Shadow IT refers to information technology (IT) projects that are managed outside of, and without the knowledge of, the IT department. As companies reach to the “cloud” their enthusiasm for hasty adoption can suddenly be tempered by security, compliance, and governance concerns. Once this is reviewed and a plan of action made then adoption makes perfect sense. However it’s the shadow/ …
What Azure Active Directory can do for your business
During the 2020 pandemic, there was a shift from office-based authentication to home working. Fortunately, most of our clients had already migrated to the cloud and their phones were cloud based. If the business was not cloud centric, they would need access to data and if the physical server was in the office, then this posed a few problems. Data needs …
What is all the fuss about Passwordless Authentication?
Poor password hygiene remains a key security weakness for many businesses. All employees know that a password should be long, complex, unique and never shared with anyone. Although this is simple in theory, in practice it can be difficult to remember a new complex password for every application or system. For this reason, it is common for employees to re-use …