Browse by Tags

  • Blog Post: Device Management Strategy Planning: More Questions Than Answers

    Within the last few years, while in meeting discussing a Mobile Device Management (MDM) strategies , I have been frequently told the following by clientele when inquiring about business requirements: “I want to be able to do all my tasks on my iPad that I currently do on my desktop.” The...
  • Blog Post: Device Management Strategy Planning: Defining the Opportunity

    To this day, many organizations still struggle with regards to device management strategy. While email security is still a top priority, businesses are attempting to do more with these devices to further enable their employees. This post series entitled “Device Management Strategy Planning”...
  • Blog Post: Microsoft Intune Policies For Samsung Knox Enabled Devices

    While delivering last week’s CANITPRO Business Mobility Camp in Calgary, a question was brought forth in regards to what specific policies can be enforced on A Samsung KNOX enabled device via Microsoft Intune. For those unaware, Samsung’s KNOX offering is additional software & hardware...
  • Blog Post: Addressing Shadow IT Via Enabling Azure Active Directory Services

    The age of Shadow IT was introduced not so long ago via the plethora of devices (smartphones / tablets / notebooks) brought by employees into their respected organizations. With employee hopes of being able to use said device to address both work and personal needs all but dashed by IT’s possible...
  • Blog Post: Windows Server 2012 R2: Reducing The Attack Footprint Through Features On Demand

    Windows Server 2012 R2, when deployed in core mode , provides the smallest installation footprint thus thwarting attacks via the GUI and other payloads not installed in this instance. Core mode is not for everyone, and while it is possible to add GUI functionality, some still prefer the familiarity of...
  • Blog Post: What is Azure Rights Management?

    Azure Rights Management Services (RMS), newly added to Microsoft’s Enterprise Mobility Suite, enables the ability to help protect sensitive company information by controlling how said information is used and to block unauthorized access. The service uses identity, encryption, and authorization...
  • Blog Post: Off to the MVP Summit

    It maybe a quiet week here at the Candian IT Professionals blog with Damir starting out on the Unify Tour and myself heading down to Redmond for the MVP Summit so in order to keep you occupied for the week I'm going am posting some links to the videos I've dropped on my Zune to watch on the plane. Now...
  • Blog Post: Test Your Skills at Defending Your Data Center

    A little while ago I got an email from a friend of mine who works at Dell Canada. It talked about a game they developed in conjunction with us (Microsoft) and Intel that allows you to test your skills and knowledge at protecting a data center from security and other threats. The new Data Center Defender...
  • Blog Post: Hacker or Defender?

    I’ve always had the belief that in order to really understand something you have to break it and then fix it. Well maybe not break it but take it apart at least :) I really believe this when it comes to security. If you don’t know what threats are out there, how can you protect against them? If you don...
  • Blog Post: Another Launch?

    Yes, indeed, we have another launch. Today, May 2nd 2007, is the launch day for System Center and Forefront tools. Some of these tools have RTM'd already and some are set to in the near future. On the upcoming Future of the Server Room tour Rick and I will be talking about System Center Operations Manager...
  • Blog Post: Patching – how do you cope?

    Patching is a necessary evil. A lot of IT pros don’t like to talk about patching due to the amount of work it can generate for them in their already PACKED jobs. It came up as a heated topic of discussion at a user group event I attended a while back – so much so, I decided to produce a monthly podcast...
  • Blog Post: SecTor 2009

    It is almost that time of year again! Time to put on the black/white/aluminum foil hat and learn about the latest in security. I’ve said it before and I will say it again, you cannot protect against what you do not know exists. We recently finalized the speakers and here is a glimpse at what you can...
  • Blog Post: “Security Bulletins for the regular IT guy” Podcast – 6/11/2009

    Three guys got together over pints in February 2009 and talked about how one of the issues facing Technical Professionals today is keeping their systems patched and up to date. This issue was brought up to them at a User Group meeting they were attending ( Ottawa Windows Server User Group ) where we...
  • Blog Post: Security Bulletins for the Regular IT Guy–# 29, April 2011

    Over pints Pierre Roman, Bruce Cowper and Rick Claus decided they would put together a concise and timely podcast each “Update Tuesday”. The object is to keep it simple by letting you know in plain non technical language what the updates are, what they resolve and why you should care. ...
  • Blog Post: Identity Management

    A fellow IT Pro Advisor from Australia, Michael Kleef , posted an link to an article on identity management at InformationWeek.com . The article talks about centralized identity management and refers to a survey saying "64% of the 627 IT pros surveyed ......say their companies use identity and access...
  • Blog Post: Direct Access in Server 2008 R2

    I managed to find a spot for myself on the DirectAccess dogfood going on now at Microsoft.  This is by far the single best technology that Microsoft has produced that I can remember.  Remember back to when you first got Outlook Anywhere back with Exchange 2003 SP2 and then think about expanding...
  • Blog Post: Security Bulletins for the Regular IT Guy #33, August 2011

    Over pints Pierre Roman, Bruce Cowper and Rick Claus decided they would put together a concise and timely podcast each “Update Tuesday”. The object is to keep it simple by letting you know in plain non technical language what the updates are, what they resolve and why you should care. ...
  • Blog Post: Pass the Word… Developing a plan to change your on-line passwords.

    How often do you change your online passwords?  If you are like the vast majority of us then the answer is not nearly often enough.  Until recently I fell into the same category, and fixing that took a little bit of doing. One day several months ago I looked at Theresa and said ‘I think I am...
  • Blog Post: Windows 8: More beautiful, more flexible and more secure

    Hello folks, Windows 8 has been since October 30 th 2012. And a lot has been said about it. Some may love it as I do, and some may still need another look before being convinced. One of the many improvements in Windows 8 that has been “baked-in” is definitely the security enhancements...
  • Blog Post: Tick, Tock…Getting Close to the End of the XP Clock

    April 8, 2014 . No it’s not the predicted end of the world, thought it may seem that way for some. It’s the end of support for Windows XP SP3. Windows XP has been a great Operating System and feedback I get is that it’s stable and who doesn’t like stable. In fact, I remember...
  • Blog Post: [Podcast] Computer Forensics with Kai Axford and TPS

    At the recent SecTor event I had a chance to sit down with Kai Axford, who is part of Microsoft's Trustworthy Computing team, and Warren Bulmer from the Toronto Police Service after their session on Computer Forensics ( PPT and WMV available). What do you do when you think a machine has been exploited...
  • Blog Post: Last Chance for SecTor

    Based on the recent success of the My TechNet Security Tour, IT pros and developers in Canada care about security. Computer security impacts our lives in so many ways from personal things like online banking, to protecting corporate assets. In order to know what to protect and how to protect it you need...
  • Blog Post: Wireless Security Training @ SecTor

    Well this should be fun.  I’ve often shared my opinion that in order to secure your network you need to know what you are securing it from and how attackers might gain entry.  Over the years I’ve tried my best to keep up with things but wireless security has been one area that I haven’t had...
  • Blog Post: $5 Security

    So I spent $5 on what is one of the most secure ways to do any online logins, in this case my PayPal account.  PayPal now offers a one time password token (OTP) to give its users a more secure login methodology.  Now instead of a username and password you must also provide the current passcode...
  • Blog Post: MS10-070 - Now available via Windows Update.

    On September 28th, Microsoft is released an out-of-band security update.  This bulletin, MS10-070 , has a maximum severity rating of Important and addresses one vulnerability in Windows. We covered it’s release on The Security Bulletins for the Regular IT Guy podcast episode #22 . As noted in the...