Thank you so much for reading my blog about: Cybersecurity for local governments. In this article I’ve written an high-level approach for implementation and shift from a more a more classic or less secure environment towards future proof. I would love to receive feedback in in the comment, on Linkedin or Twitter. Also read: The value of Microsoft 365 E3… Continue reading Cybersecurity for local governments – in 10 steps
Thank for reading my blog about: the technical implementation for a Microsoft 365 workplace. In this article I’ve written an high-level approach of an implementation and shift from a more traditional organisation towards a cloud focused organization. If you not totally ‘fan’ of the cloud idea please read this article: The value of Microsoft 365… Continue reading Technical High-level Modern Workplace implementation with M365
Thank you so much for reading my blog about: How to build your modern workplace with Microsoft 365. In this article I’ve written an high-level approach of an implementation and shift from a more traditional organization towards a cloud focused organization. I would love to receive feedback in in the comment, on Linkedin or Twitter.… Continue reading how to build your Zero Trust modern workplace with Microsoft 365
Mobile working is a standard, today. Companies are not longer protected by their infrastructure in their corp-environment. Crucial document data is moving away from centralized systems because it’s easier to work on them on our own document systems. The irrelevance of bombastic systems in corporate environment is holding collaboration down. Does it sounds familiar? the… Continue reading The top 10 security recommendations to consider while working from home!
Introduction I’ve seen multiple customers struggling with their corporate information. Most of the time this data is secured in a traditional way without flexibility to collaborate. Result: People find other way to collaborate: Dropbox, OneDrive, Box, Mails, Private-mails, whatsapp,.. You don’t want your personal data published on the web. Why do we allow organizations to be less… Continue reading Secure your corporate information, not your devices!
The struggle for a Multi-factor authentication implementation is REAL and most of the time, really frustrating? Some frequently asked questions and answers below! Let’s change problem into a solution. We don’t want to use Multi-factor authentication – it’s too complex! Ask the people in your organization if they use the same password as their corporate… Continue reading The Multi-factor-authentication struggle? AND the solution!