If you’re mhklassen@aol.com, your account has been compromised and is being used by criminals to attack my website. I do hold you responsible because you’ve ignored that message to change your password to something more complex and use two-factor authentication.
amy
What if we want both low and high severity alerts from a policy? Technically MCAS can’t do this.
Of all of the phrases I use to run my business, this one probably translates most directly to the bottom line.
In our previous sessions we’ve been introducing your clients to new applications that they find useful. Now we’re going to introduce them to automation of their everyday tasks
“The cost of attending Amy’s Make Money classes has the highest ROI among all my R&D expenditure. Amy did all the research and road map for me. I just setup the demo following the step-by-step guide from the class and start marketing the feature to my clients the week after.”
By make a few simple changes we can greatly reduce the amount of noise generated by MCAS and begin to use it powers for good and provide our tech staff with real actionable material to work with.
There’s been a lively discussion with “breaking news” about the extent of the intrusion into networks and the solution to it over on our Ransomware and Security group. Now that it seems to have reached a stable information point I thought I would summarize that you need to know.
Trying to figure out how to focus? Here’s a suggestion that’s built into your 365 subscription
A couple of situations have given rise to the need to prevent the downloading of data to untrusted devices.
Does everyone have sayings that thier MSP runs by or is that just a me thing? I find myself often repeating the same advice to my technical staff