Did you know that Microsoft 365 Nation contributor Ken Dwight is a published author? Dwight wrote a book (“Bug-Free Computing”) a decade ago that still has legs.

We review enhancements to the standard Office 365 proper SKUs don’t easily reveal (and in some cases you need to purchase. Starting with Advanced Threat Protection, we move to discuss safe links, safe attachments and anti-phish policies.

No SolarWinds Empower conference is complete without touching all the bases and that includes a security talk with Tim Brown, VP of Security, SolarWinds MSP. While a fellow geek, Brown is also something of a well-spoken character and has a way of

This segment is a doozie – and there’s a free Microsoft 365 book on the other end of this video. Author Alex Fields, Success Computer Consulting, has written an amazingly technical book titled “Microsoft 365 Business Admin Guide” that we quickly do an overview of parts of the book (with this month’s contribution – future months will be a deep dive).

As part of our journey around the SolarWinds Empower conference in Atlanta, we cornered Mav Turner who recently came from the mothership SolarWinds over to SolarWinds MSP. He takes a moment to lay out the organization structure and speak toward his ten-year SolarWinds career

Defining what a Managed Services Security Provider (MSSP) is (hint: Kallhoff’s Infogressive company is SECURITY ONLY!). After a tip of the hat to it’s great partnership with Fortinet, Kallhoff share’s how SMB MSPs from both SMB Nation and

Many companies – Windows Autopilot is a modern ways for device deployment…in Andrew’s words “…it’s pretty cool.” In this deep dive, we look at three main stages in the Windows Autopilot Process:

Long-time community member Dan Wensley updates us on his whereabouts since the early Level Platforms days (kids won’t get that), his contributions to CompTIA and his new role as CEO at Warranty Master.

Michael Fraser, CEO of Refactr and frequent contributor, is back for a lightening round update concerning security in Office 365. Topics this month include:
• Restriction of physical data center access.
• Ability to encrypt data at rest and over the network – a security nugget

Contributor Kew Dwight offers a deeper dive on MSPs as security targets by the “bad guys.” The whole point is that MSPs have been identified by ransomware hackers as attractive targets.

A new twist on security conversations with these topics. Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.