Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company

In the realm of IT management, overseeing user accounts and access to company resources is a fundamental task. While it's common practice to have robust processes for provisioning and de-provisioning users within Microsoft's suite of applications, such as Microsoft 365 (M365), the same diligence often does not extend to non-Microsoft applications.

Read More
Discovering and Reporting on DLP Alerts Older than 7 Days with Microsoft M365 E3
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Discovering and Reporting on DLP Alerts Older than 7 Days with Microsoft M365 E3

As we discussed in the sharing blog, your organization relies on sharing and working with information both internally and externally.Some of that data will be business and customer sensitive. Detexian’s CTO Adrian Kitto has some suggestions about how to get visibility of the DLP alerts beyond the Microsoft Purview defaults of 7 days.

Read More
Identifying, Evaluating, and Tracking Open Shares for External Users with Microsoft M365 E3
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

Identifying, Evaluating, and Tracking Open Shares for External Users with Microsoft M365 E3

“To share or not to share” is not the question this week, because we all know that your organization relies on sharing and working with information both internally and externally. So this week Detexian’s CTO Adrian Kitto is enabling you to identify and track the risks that external shares in Microsoft M365 are introducing into your organization.

Read More
Why flexibility is crucial for modern IT management

Why flexibility is crucial for modern IT management

The role of IT management isn't what it used to be. As business technology continues to evolve more rapidly by the year, the responsibilities of IT managers are constantly in motion.

One month, IT managers may find themselves setting up standardized computers and hardwares for an office, only to shift to creating work-from-home ecosystems and decentralizing their IT infrastructure the next.

Read More
Why businesses are picking up more SaaS

Why businesses are picking up more SaaS

The turn of the decade has marked another era defined by technological developments.

In 2021, Meta marked its landmark name change and functional pivot towards virtual reality, NFTs became wildly popular after seven years in relative obscurity, and monopolistic companies such as Google and Apple continued on their streaks of incredible profits and technological developments. In 2022, ubiquitously popular apps such as TIkTok have further cemented their global presence, and Uber reported their first ever positive cash flow.

Read More
The History of IT Management in 5 minutes
Thought Leadership Andy Budiman Thought Leadership Andy Budiman

The History of IT Management in 5 minutes

IT Management is infamous for requiring constant upskilling, adaptation and innovation. It's a role that is dictated by rapidly changing technological norms, and demands that even the most storied professionals either keep up with the cutting edge or fall into obscurity.

Many of us who initially got into IT simply because we were good at computers may find that, between security policies, software licensing, networking, and project management, physical computers have turned out to be the least of our concerns.

Read More
Three common types of SaaS misconfiguration (and how to fix them)

Three common types of SaaS misconfiguration (and how to fix them)

Cyber security is often boiled down to a couple of cliches. Strong passwords, a sturdy firewall, and anti-virus softwares. And while all of these measures are crucial components of business security, they do not adequately represent the most prevalent threats in modern cybercrime.

In a recent survey from The Cloud Security Alliance (CSA), it was revealed that 43% of organizations had experienced one or more security incidents resulting from a SaaS misconfiguration. This refers to when a 'Software As A Service' (SAAS) has suffered a data breach on account of poorly configured security settings and/or lacking security practices.

Read More
Proactively Managing the selection and implementation of SaaS tools for the Workplace
Guest Author, Thought Leadership Andy Budiman Guest Author, Thought Leadership Andy Budiman

Proactively Managing the selection and implementation of SaaS tools for the Workplace

Businesses have well and truly invested in SaaS tools to scale and enable their business. Businesses can centralize or decentralize the process in SaaS solutions. IT leaders have a key role to play as to how a business operates when it comes to process and technology. SaaS can alter a business’s security posture and change how the business operates.

IT can play a key role in helping teams select the right tools forming a greater level of trust. The end game is IT becoming the trusted advisor and proactively being involved in the process early.

Read More