Microsoft Azure has taken a major step ahead of its rival cloud platforms with its continued commitment to security in the form of ISO 27017 cloud security certification. Achieving compliance with the ISO27017 cloud security certificate dictated that Microsoft had to adhere to 44 different cloud risk and threat model controls. With these additional security […]

Office 365 Single Sign-On

Office 365 SSO: The secure configuration of this cloud-hosted service aligns with government’s guidance on implementing the Cloud Security Principles. You can find out more regarding implementation of Federation in order to Restrict Access to Office 365. 1. What is Office 365 SSO (Single Sign-On)? A Microsoft Online user usually signs in using the username and […]

At the risk of this becoming another rant, I’ll keep it brief. Many organisations and leaders of organisations bang on and on about how great they are. Some are even right to do so. But from my experience what an organisation says about themselves tends to only contain the good news, especially where organisations, due […]

Funnily enough I’m asked this question more and more frequently, “Which is better, Google Apps or Microsoft Office 365?”. Other cloud collaboration & communication services are available, however, this is my opinion and not an all encompassing review of the services. My immediate answer is always, “Office 365”. Bear with me here and I’ll try […]

Open Office 365 reports from directly in Excel and get your Exchange Online reporting! Predefined reports in the Office 365 Admin Portal are fine for overview, however, if you require more granularity then Office 365 reporting has to be performed via PowerShell or some other development language to access the Office 365 Exchange Online reporting […]

IP Telephony, Phone

We asked Trevor, a relative newcomer to IP Telephony, to explain what it is, what it can do, and how you can benefit from it, in his own words: A question most often asked by many people, including myself when I first heard of IP Telephony. From my research it has nothing to do with the […]

We get asked about this particularly irksome issue by clients from time to time. It’s almost always described as “all of the emails from our most important client are going into Spam” or perhaps “the world is about to end and I’ve found the most important email ever in my Junk Folder”. Ordinarily this can […]

This week, BT had an outage. Hundreds of thousands of customers were left without internet or phone services. In the aftermath, it was discovered that the cause was a broken router, and this single point of failure was responsible for widespread disruption, and the loss of incalculable productive hours and revenue. Additionally, BT’s customer contact […]

Eating your own dog food

Goodness, it’s been ever such a long time since I last posted. We’ve been busy. I wish I could say we’ve been busy acquiring new customers and altering many a paradigm. The reality is much more mundane but equally as important. We moved into our own office on the 1st December 2015, and as it […]

Passwords, encryption and good practice

Passwords should be complex and changed regularly. Encryption should be implemented for any business critical information and especially for any information which is mobile or transported in any fashion. Why then do we still get asked the question “why do we need to change our passwords so often” and “do we have to have such […]