Connecting to corporate resources via Cisco AnyConnect using FreeRadius and Google Authenticator has its pros and cons. One noteworthy advantage is the cost: it’s free.
Skype for Business CCE is a hybrid solution that allows integrating the corporate PBX with the Office 365. CCE offers a set of components offering organizations to connect to the corporate PBX, organize the SIP trunk from your Office 365.
A couple of days ago Microsoft released the Cloud Connector Edition (CCE) for Skype for Business Online, a hybrid solution that enables integrating your corporate PBX with the Office 365.
After the launch of Windows 10 the internet was flooded with messages about the collection of users’ personal data followed by multiple discussions about how to tackle the issue. The user community instantly came up with a list of major servers that collect data and tried to block them via the HOSTS file.
The competent approach to IT security in terms of server authorization, both inside and outside the company premises, implies a number of important measures. They include providing a unique user name and meeting password complexity requirements, as well as conducting the planned password change and non-disclosure of credentials to third parties, etc.
Malware, or malicious software, stands for a broad range of applications designed to harm your computer or use it to do damage elsewhere. Malware comes in different shapes and sizes including viruses, Trojan horses, spyware, and others
Until recently, “public” communication tools (such as Skype, Telegram, WhatsApp) and corporate communication tools (Lync, Sametime, etc.) were separated by a difficult-to-penetrate wall. Corporate messengers have well-developed security and auditing features.
Outsourcing IT infrastructure services is a logical step for a growing business. When a qualified contractor is selected, it allows an organization to optimize IT costs and improve quality of service.
The large number of hacks of celebrities’ email accounts reported by the media and widely discussed by the general public cause users to be greatly concerned about the safety of their data.
In this article we will review the installation of Bitlocker with the TPM module on the Hyper-V Server 2012 R2 Core.