The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

by Mike Collishaw | Feb 25, 2026 | Cybersecurity

For years, enabling Multi-Factor Authentication (MFA) has been a cornerstone of account and device security. While MFA remains essential, the threat landscape has evolved, making some older methods less effective. The most common form of MFA, four- or six-digit codes...
Securing the ‘Third Place’ Office: Policy Guidelines for Employees Working from Coffee Shops and Coworking Spaces

Securing the ‘Third Place’ Office: Policy Guidelines for Employees Working from Coffee Shops and Coworking Spaces

by Mike Collishaw | Feb 10, 2026 | Cybersecurity

The modern office extends far beyond traditional cubicles or open-plan spaces. Since the concept of remote work became popularized in the COVID and post-COVID era, employees now find themselves working from their homes, libraries, bustling coffee shops, and even...
How to Implement Zero Trust for Your Office Guest Wi-Fi Network

How to Implement Zero Trust for Your Office Guest Wi-Fi Network

by Mike Collishaw | Jan 20, 2026 | Cybersecurity

Guest Wi-Fi is a convenience your visitors expect and a hallmark of good customer service. But it’s also one of the riskiest points in your network. A shared password that’s been passed around for years offers virtually no protection, and a single compromised guest...
The Hidden Risk of Integrations: A Checklist for Vetting Third-Party Apps (API Security)

The Hidden Risk of Integrations: A Checklist for Vetting Third-Party Apps (API Security)

by Mike Collishaw | Dec 19, 2025 | Cybersecurity

Modern businesses depend on third-party apps for everything from customer service and analytics to cloud storage and security. But this convenience comes with risk, every integration introduces a potential vulnerability. In fact, 35.5% of all recorded breaches in 2024...
Securing Your Supply Chain: Practical Cybersecurity Steps for Small Businesses

Securing Your Supply Chain: Practical Cybersecurity Steps for Small Businesses

by Mike Collishaw | Aug 29, 2025 | Cybersecurity

Picture this: your business’s front door is locked tight, alarm systems are humming, and firewalls are up, but someone sneaks in through the back door, via a trusted vendor. Sound like a nightmare? It’s happening more often than you think. Cybercriminals aren’t always...
Decoding Cyber Insurance: What Policies Really Cover (and What They Don’t)

Decoding Cyber Insurance: What Policies Really Cover (and What They Don’t)

by Mike Collishaw | Jul 15, 2025 | Cybersecurity

For small businesses navigating an increasingly digital world, cyber threats aren’t just an abstract worry, they’re a daily reality. Whether it’s phishing scams, ransomware attacks, or accidental data leaks, the financial and reputational damage can...
« Older Entries

Recent Posts

  • The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)
  • The Decision‑maker’s Guide to Comprehensive Security
  • Customizing generative AI for unique value
  • 10 essential insights from the Microsoft Digital Defense Report 2024
  • Innovation with Azure OpenAI Service

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • AI
  • Azure SQL
  • Backup
  • Business
  • Business Continuity
  • Cloud
  • Cybersecurity
  • Dynamics 365 Sales Professional
  • IoT
  • IT Management
  • IT Security
  • Managed Service
  • Microsoft
  • Microsoft 365
  • Microsoft 365 Business
  • Microsoft Azure
  • Microsoft Dynamics 365
  • Microsoft Dynamics 365 Business Central
  • Microsoft Office 365 Cloud Solutions
  • Microsoft SQL Server
  • Microsoft Teams
  • Microsoft Teamwork Solutions
  • New Technology
  • Office 365
  • Online Presence
  • Productivity
  • Productivity Tools
  • Sales
  • Uncategorized
  • Windows 10
  • Windows Server 2019
  • Working from Home

Recent Posts

  • The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)
  • The Decision‑maker’s Guide to Comprehensive Security
  • Customizing generative AI for unique value
  • 10 essential insights from the Microsoft Digital Defense Report 2024
  • Innovation with Azure OpenAI Service

Recent Comments

    • Follow
    • Follow
    • Follow

    Follow us on social media for regular updates

    Copyright © 2022, 32 Byte