Author: admin

Unifi Wireguard MDM Deployment on macOS

Wireguard is fabulous due to its speed, but there’s not much data available about how to deploy it using standard macOS tooling like MDM. In this case Mosyle MDM has a custom VPN profile, but it doesn’t support the method we need, so we need to use iMazing Profile Editor. Luckily this tool DOES have a profile that supports Wireguard,

Read More »
Free Person Holding a Remote Control Stock Photo
Cybersecurity

6 Immediate Steps You Should Take If Your Netflix Account is Hacked

Netflix is one of the most popular and well-known streaming services. It has nearly 231 million subscribers around the world. It has been growing steadily for almost a decade. The platform has become an essential part of many people’s daily entertainment routines. They fire up their devices, log in, and pick right back up on their favorite shows. Unfortunately, like

Read More »

Zoho Desk and Zitadel SAML

This integration took 6 months of work, so I hope it helps someone else… Updated 25.9.2023 as some of these things have been fixed. I hope my edits make sense! Background- The Zoho Desk Knowledgebase is quite full featured but has some odd quirks, some that make it unusable for us.For example, you can set up users, groups categories etc.

Read More »
person using black smartphone with gray and pink case
Cybersecurity

What Is App Fatigue & Why Is It a Security Issue?

The number of apps and web tools that employees use on a regular basis continues to increase. Most departments have about 40-60 different digital tools that they use. 71% of employees feel they use so many apps that it makes work more complex. Many of the apps that we use every day have various alerts. We get a “ping” when

Read More »
Free Side View of a Woman Using a Laptop Stock Photo
Cybersecurity

These Everyday Objects Can Lead to Identity Theft

You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time. What about your trash can sitting outside? Is it a treasure trove for an identity thief trolling the neighborhood at night? Many everyday objects can lead to identity theft. They often get overlooked because people focus on their computers

Read More »
iphone screen with icons on screen
Microsoft

How to Use the New Virtual Appointments in Microsoft Teams

Scheduling appointments is a common activity. Salespeople often set up virtual appointments to answer questions about a product. Software companies allow people to schedule live demos. Telehealth therapists allow clients to book video sessions. Those are just a few examples of some groups that are going to love a new Microsoft Teams feature. Virtual Appointments was recently added to the

Read More »
Free Technology Drone photo and picture
New Technology

Check Out the Coolest Tech from CES 2023

At the beginning of each year, a group of global innovators meets. They introduce and show off breakthrough technologies. It’s done at the Consumer Electronics Show (CES), which is typically held each January in the U.S. This year, over 3,200 exhibitors from 173 countries showed off the future. Giving us a glimpse of what could show up in our homes

Read More »
Free Call Center Customer Service vector and picture
New Technology

7 Customer-Facing Technologies to Give You an Advantage

Customers look for convenience. In today’s world that means technology that makes their life easier. From webforms to POS systems, you need to keep the customer experience in mind in all you do. When people aren’t happy with their experience interacting with a company, they leave. And their experience might not have anything to do with your products or services.

Read More »
Free Cyber Security Information Security illustration and picture
Cybersecurity

6 Things You Should Do to Handle Data Privacy Updates

Once data began going digital, authorities realized a need to protect it. Thus, the creation of data privacy rules and regulations to address cyber threats. Many organizations have one or more data privacy policies they need to meet. Those in the U.S. healthcare industry and their service partners need to comply with HIPAA. Anyone collecting payment card data must worry

Read More »
Free Microsoft Notebook photo and picture
Microsoft

Windows 8.1 Just Lost All Support. Here’s What You Need to Know

Companies both large and small share this one cybersecurity problem. They have computers that are still running older operating systems. Staff might use these devices only occasionally. Or the company may be running customized software that won’t run on newer OS versions. The problem is that when the OS becomes outdated, the system is open to cyberattacks. When Microsoft or

Read More »