Category: Permissions

0

Basic Security Setup for Microsoft 365 – @M365CommDocs

This morning my first Microsoft 365 Community Document went live. It is entitled “Basic Security Set Up for Microsoft 365“. In the document, I walk through some of the reason to set Security, assuming...

0

What is Zero Trust? What is Microsoft 365 Zero Trust?

Zero Trust is a model that focuses on strict identity verification for any person or device trying to access resources with the corporate network. It does not matter whether the person or device is...

0

A year of creating courses, working and family importance

So this year has been busy for me, with it being the first full year of working for myself, as well as a bunch of family things that have impacted all of it. We...

0

Nothing special…

Not anything special at all, except telling you I actually have a website for my company SharePlicity now. I have been meaning to create one for a long time but just never had time....

1

Is it a problem to customize SharePoint?

As you know, I enjoy working with SharePoint, Office 365 and of course the Security for that. I have spent a lot of my working career always drawn back to customizing the core platforms...

0

Quick Update!!

As you know, starting in June of this month I left my job at Protiviti and started working for myself, creating a company called SharePlicity. So far so good, it has been more relaxing...

0

Munich in June

On Wednesday, 27th of June 2018, Rencore will host a Full-day Tutorial on Building modern solutions for SharePoint and Office 365. This will be run by none other than Erwin van Hunen, Hugh Wood, and...

0

Webinar Series Update: Evading Anti-Virus

In the webinar I gave last week based on “How attackers break in“, there were several questions at the end that focused on password management and then also evading anti-virus. During the webinar, I...

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...