Mimecast Email Security Firm Compromised

Mimecast, a popular Email Security and Archival platform, posted on its blog Tuesday that a certificate it uses to encrypt traffic between itself and Microsoft was hijacked. Details are sketchy at this point, but the company is estimating approximately ten percent of its more than 36,000 customers use the corrupted connection. The suggested action is […]

Understand Employee Utilization with Microsoft 365 Usage Reports

A question that I am often asked after a Microsoft 365 implementation is, “How do I know what people are doing with it ?” Microsoft’s ever evolving cloud platform has recently added an improved reporting feature that is easy to use and very informative. Logon to the Microsoft 365 admin portal with your global administration […]

Deploy a Linux VM on Hyper-V with Sound 20.04 Edition

In a previous article I explained how to use PulseAudio with XRDP to allow your Ubuntu Hyper-V VM to pass audio through your host machine’s sound system. It has been brought to my attention that the instructions do not work for everyone. I believe most of the people that have issues are choosing the 20.04 […]

The Best Technology of 2020

The year 2020 has been a rough one for so many reasons. Pandemics, economic disasters, political division, and natural disasters have made it one of the darkest years in memory. If there is a silver lining, for me it was all the great technology that made its way to market this year. Before we discuss […]

Edit Code on Your Android Device

Every once in a while I find myself needing to review or edit code on my mobile. It never fails, I’ll be out with my family and the solution to some problem I have been struggling with will pop into my head seemingly from nowhere. The other common scenario I experience is somebody emailing me […]

SolarWinds Orion Monitoring Tool Has Been Compromised

SolarWinds is an Austin Texas based company that makes a lot of tools used by IT departments the world over. Their all-in-one monitoring suite known as Orion has been the victim of a supply chain attack. In what experts are calling a Nation State funded hack, updates to the software over the last several months […]

PowerShell: Find USB Storage Devices

Most Administrators know that you can use a GPO to disable the ability to use USB storage devices on Windows computers. So you look up the instructions and implement the policy, but how do you know if it’s working? I’m sure you made a test OU while you were working out the best option for […]