Skip to main content

Posts

Showing posts from March, 2022

USB Forensics — Recover More Volume Serial Numbers with the Windows 10 Partition/Diagnostic Event Log

Windows 10 introduced an event log of high value to digital forensic examiners and incident responders — especially when device attribution is required. Written for a technical audience, this blog shares the results of an analysis showing what can be stored in the log. Read the blog to gain insight into methodology, results and their relevance. Read More...

Hybrid Teamwork: A Guide to Flexible Work

The shift from remote-only during the early stages of the pandemic to a more hybrid mix of in-office and remote today presents some challenges for IT and network administrators. Read this eBook to gain insights and to help better navigate the future of the modern, hybrid workplace. View: Hybrid Teamwork: A Guide to Flexible Work

Your Guide to Mobile Digital Forensics

The security community is constantly learning from each other to better protect the world against cyber threats. In this blog, Microsoft Security Product Marketing Manager Natalia Godyla talks with Cellebrite Senior Director of Digital Intelligence, Heather Mahalik. Read the blog for expert insight on digital forensics with a focus on mobile forensics — from technical guidance to hiring best practices. Read More...

How can GingerSec help you enable employees to collaborate effectively in remote and hybridwork scenarios? RT to start a conversation and check back regularly for updates on our @Microsoft #hybridwork solutions. @MicrosoftTeams #hybridwork

How can GingerSec help you enable employees to collaborate effectively in remote and hybridwork scenarios? RT to start a conversation and check back regularly for updates on our @Microsoft #hybridwork solutions. @MicrosoftTeams #hybridwork

Microsoft Digital Defense Report

Covid has sparked a burgeoning cybercrime economy and rise in cybercrime services with continues to grow in complexity and fervency. The trend encompasses new levels of supply chain and ransomware attacks that serve as a powerful reminder of the need to protect cybersecurity. The Microsoft Digital Defense Report draws on insights, signals and data from the cloud, endpoints and the intelligent edge. In sharing these insights, Microsoft aims to empower the world to defend the online ecosystem more effectively. Download the report to build your understanding of threat and attack trends and get recommendations for proactive actions you can take for cybersecurity. View: Microsoft Digital Defense Report

Hybrid Work: A Guide for Business Leaders

Flexible work is here to stay. But the shift to hybrid work is not just remote work on overdrive. It's a strategic business opportunity for every organization that requires a new operating model. As a leader, you need a roadmap to guide the entire organization on the path to hybrid work. "Hybrid Work: A Guide for Business Leaders," is your blueprint. Download your complimentary guide to benefit from lessons learned by Microsoft in the transition to hybrid work and keys to success discovered along the way. View: Hybrid Work: A Guide for Business Leaders

Microsoft Azure IoT Manufacturing Solutions

From driving operational efficiency to improving product quality, IoT remote monitoring solutions help manufacturing companies achieve real-time visibility into production and save time and money. In the face of challenges like COVID-19 and shifting IT boundaries, Microsoft customers use highly secure Azure IoT solutions to drive speedy and cost-effective results. Watch this video to discover the benefits of IoT in manufacturing.

Reshaping Creativity

Today's creative industries require devices with 3D capabilities, AI tools and (n)K resolution. That's a pretty high bar, but it's also one that can be crossed with the Z by HP line of high-performance workstations. Creative professionals will want to download the new eBook "Reshaping Creativity" by HP that shows how creative professionals are using the computing power of ZBooks to redefine their work. View: Reshaping Creativity

Customer Success Story: The Little Potato Company

What does advanced threat protection and identity management look like in action? Read this customer success story to find out how a family-owned agriculture company uses Microsoft cloud technologies like Azure and Microsoft 365 to apply strict identity and access management controls with advanced threat protection products to revitalize their business. Read More...

Customer Success Story: The Little Potato Company

What does advanced threat protection and identity management look like in action? Read this customer success story to find out how a family-owned agriculture company uses Microsoft cloud technologies like Azure and Microsoft 365 to apply strict identity and access management controls with advanced threat protection products to revitalize their business. Read More...

Suffolk Builds Efficiency into Data Access with Microsoft Teams to Save Time and Money

As the construction sector shifts to cloud solutions and big data, leading companies like Suffolk keep pace by empowering employees with software tools from the Microsoft 365 cloud productivity suite that are just as useful in the head office as on the jobsite. Get the story on how Microsoft 365 cloud tools including Teams for virtual collaboration help Suffolk save valuable time and money by building efficiency into data access and teamwork. Read More...

Suffolk Builds Efficiency into Data Access with Microsoft Teams to Save Time and Money

As the construction sector shifts to cloud solutions and big data, leading companies like Suffolk keep pace by empowering employees with software tools from the Microsoft 365 cloud productivity suite that are just as useful in the head office as on the jobsite. Get the story on how Microsoft 365 cloud tools including Teams for virtual collaboration help Suffolk save valuable time and money by building efficiency into data access and teamwork. Read More...

Zero Trust Explained

Implementing Zero Trust can reduce risk, build trust and improve protection across the board with Microsoft 365. Today's enterprise customers need a better security model that adapts to security threats and provides a secure place to store data with Microsoft 365. Watch this video to get an overview of Zero Trust.

Zero Trust Explained

Implementing Zero Trust can reduce risk, build trust and improve protection across the board with Microsoft 365. Today's enterprise customers need a better security model that adapts to security threats and provides a secure place to store data with Microsoft 365. Watch this video to get an overview of Zero Trust.

The Living System

You'll want to take a few minutes to watch "The Living System," a stunning video by seven artists around the world that explores energy, creation and adaptive environments. Designed on Z by HP laptops, it's a compelling display showing the capabilities of the powerful ZBook workstations. Watch for inspiration!

5 Lessons We've Learned From Leading a Hybrid Organization for 8 Years

When and how companies should bring people back into the office — if at all — has been a hot topic in business since the world started reemerging from lockdowns and other restrictions. Alexi Robichaux, CEO of hybrid-first company BetterUp, gets asked all the time about his thoughts on hybrid workplaces. He shares insights into what makes a hybrid model work or not in this article. Read it for 5 lessons learned from leading a hybrid organization. Read More...

5 Lessons We've Learned From Leading a Hybrid Organization for 8 Years

When and how companies should bring people back into the office — if at all — has been a hot topic in business since the world started reemerging from lockdowns and other restrictions. Alexi Robichaux, CEO of hybrid-first company BetterUp, gets asked all the time about his thoughts on hybrid workplaces. He shares insights into what makes a hybrid model work or not in this article. Read it for 5 lessons learned from leading a hybrid organization. Read More...

HP Presence Aware

An open computer on an empty desk is an invitation to a ransomware attack, malware infection or stolen data. Read this detailed Infosheet that shows how the Presence Aware app by HP will lock your laptop when you step away from and automatically unlock it when you return. It's a step up in in-office cyber protection. View: HP Presence Aware

What's the secret to leading a successful #hybridwork organization? Consider retweeting to get the conversation going. Get in touch to discuss GingerSec's hybrid work solutions including @Microsoft365.

What's the secret to leading a successful #hybridwork organization? Consider retweeting to get the conversation going. Get in touch to discuss GingerSec's hybrid work solutions including @Microsoft365.

What's the secret to leading a successful #hybridwork organization? Consider retweeting to get the conversation going. Get in touch to discuss GingerSec, LLC's hybrid work solutions including @Microsoft365.

What's the secret to leading a successful #hybridwork organization? Consider retweeting to get the conversation going. Get in touch to discuss GingerSec, LLC's hybrid work solutions including @Microsoft365.

3 Key Resources to Accelerate Your Passwordless Journey

Every organization faces password-related challenges. Phishing campaigns, productivity loss, and password management costs can quickly balloon before you know it. The risks outweigh the benefits when it comes to passwords. Even the strongest passwords are vulnerable to attacks. It's time to look at password alternatives that are convenient and secure. This blog provides a few simple steps for planning and deploying a passwordless future. Read it for insight. Read More...

3 Key Resources to Accelerate Your Passwordless Journey

Every organization faces password-related challenges. Phishing campaigns, productivity loss, and password management costs can quickly balloon before you know it. The risks outweigh the benefits when it comes to passwords. Even the strongest passwords are vulnerable to attacks. It's time to look at password alternatives that are convenient and secure. This blog provides a few simple steps for planning and deploying a passwordless future. Read it for insight. Read More...

Forrester TEI Report — The Total Economic Impact of Microsoft Teams Calling Solutions

Companies have been transforming operations and how employees collaborate with solutions like Microsoft Teams. With Microsoft Teams Calling solutions, enterprises and SMBs can integrate voice into their broader collaboration and digital transformation initiatives. In this Total Economic Impact (TEI) study, Forrester Consulting explores the potential return on investment (ROI) companies can realize with Microsoft Teams Calling solutions. Download the report to examine the benefits including increased user collaboration and productivity, lower total cost of ownership (TCO) and better business outcomes. View: Forrester TEI Report — The Total Economic Impact of Microsoft Teams Calling Solutions