Why charging extra for basic security features like SSO is a bad practice

In today’s digital landscape, security isn’t just a feature, it’s a necessity. Yet, some major companies continue to place essential security features like Single Sign-On (SSO) behind higher-tier pricing plans. This practice not only undermines user safety by exploiting organisations need for basic security measures but also creates unnecessary barriers to efficient workflow, potentially leaving

Read More

Keeping Active Directory secure and tidy with PowerShell: Identifying stale accounts

Maintaining a clean and secure Active Directory (AD) environment is essential for ensuring the safety and efficiency of your organisation’s network. Regularly identifying and managing stale accounts, those that haven’t been used in a long time, helps mitigate security risks, reduce clutter, and streamline user management. In this article, we’ll walk through a PowerShell script

Read More

Understanding the ‘Protected Users’ group in Active Directory: When to use it and when not to

Active Directory (AD) is packed with powerful security features designed to reduce the risk of identity compromise. One such feature is the Protected Users group. Introduced with Windows Server 2012 R2, the Protected Users group offers an additional layer of security for high-risk and high-privilege accounts by enforcing strict authentication policies. However, this group is

Read More

How to Create an ESXi Bootable USB Drive

Introduction Creating an ESXi bootable USB drive is a crucial step in setting up your VMware environment. This guide will walk you through the process, ensuring you have a reliable and functional bootable drive for your ESXi installation. Requirements Before you begin, ensure you have the following: – A USB flash drive with at least

Read More

PowerShell Tips: How to Use PowerShell to Search for Files Containing a String

Introduction to PowerShell for File Searches PowerShell is a powerful scripting language and command-line shell designed especially for system administrators. One of its useful functionalities is the ability to search for files containing a specific string. This capability can streamline many administrative tasks, making it easier to manage and locate vital information across your file

Read More

PowerShell tips: Sending emails in PowerShell

In today’s fast-paced IT environments, automating routine tasks is not just beneficial; it’s essential. One of the most common automation tasks is sending emails. PowerShell, with its versatile cmdlets and scripting capabilities, provides a powerful tool for this purpose. This article delves into how you can leverage PowerShell to send emails, both with and without

Read More

The strategic importance of Surface Pro 10 and Surface Laptop 6 for AI-driven business efficiency

In today’s fast-paced business environment, leveraging artificial intelligence (AI) to enhance user efficiency stands as a cornerstone for companies aiming to maintain a competitive edge. The introduction of the Surface Pro 10 and Surface Laptop 6 by Microsoft marks a significant milestone in this journey, offering a suite of features that cater to the dynamic

Read More

Microsoft introduces hot patching: A game-changer for IT infrastructure

Microsoft’s recent announcement about the introduction of hot patching marks a significant milestone in the realm of IT infrastructure management and cyber security. This innovative approach to software maintenance allows for patches to be applied to servers and applications without the need for a system reboot. This advancement is poised to revolutionise how businesses maintain

Read More

Windows 11 Tip: Navigating the Linux Subsystem in Windows, A Comprehensive Guide

In the evolving landscape of operating systems, the integration of Linux within Windows, through the Windows Subsystem for Linux (WSL), marks a revolutionary step for developers and IT professionals. This guide offers a comprehensive overview of WSL, detailing its variations, installation procedures, potential uses, and the requisite system requirements. Understanding WSL The Windows Subsystem for

Read More