Blog

How Strong are Your Passwords?

Recently, I learned of a significant – and honestly quite brilliantly executed – security breach of a major company. The breach infiltrated a sophisticated system secured with some great security equipment. This company invested large sums of money to make their system very secure, and they accomplished that. But the brilliant hackers thought outside the […]

Read More

Remove-AzureRmADApplication: Deletion of multi-tenant application is currently not supported

If you’re a developer that is constantly trying out new things, you may want to clean up old and unused Azure AD applications in your development tenant. In my case, I wanted to remove every single one, which is the very simple one-line command with PowerShell: Get-AzureRmADApplication | Remove-AzureRmADApplication. If you use applications that are configured for […]

Read More

Nutanix – Self Service Restore

Since Nutanix Acropolis Operation System 4.6, Nutanix has offered the Self Service Restore function for virtual machines running Nutanix Guest Tools. This feature allows VM admins to complete a recovery from the Nutanix data protection snapshots with minimal administrator intervention. There are a few ways to accomplish this, I will be walking you through using the […]

Read More

Is Email Your Largest Security Vulnerability? Office 365 Advanced Threat Protection Can Help!

What would you say is your largest security vulnerability?  In a recent study sponsored by MalwareBytes and Osterman Research, 31% of ransomware attacks were via links in email and 28% were due to attachments.  That is 59% of attacks originate in email. Traditional Anti-Virus and SPAM protection don’t go far enough to mitigate these risks. Modern […]

Read More

Zerto - Disaster Recovery

Advanced Disaster Recovery Made Simple – Zerto 5.0

Zerto is an industry leader in disaster protection and disaster recovery for virtual computing environments.  With the recent version of Zerto 5.0 released, businesses can take advantage of advanced disaster recovery technology while also introducing simplicity and confidence in their ability to completely avoid or recover from disasters.  Here are a couple examples of how recent eGroup […]

Read More