Cyberist Strategy: Outsmarting the System
“Kevin, we’ve lost control of the automation.”The voice comes through the encrypted line — calm but clipped, like someone describing […]
Cyberist Power: Responsibility in Creation
There’s a weight that comes with innovation — the kind you don’t feel until the screens dim and the room […]
Cyberist Focus: Finding Clarity in Infinite Connections
I can’t breathe.Not because of panic — because of noise. The dashboards are screaming again. Alerts, logs, API metrics, performance […]
Cyberist Empire: Order in the Digital Desert
The lights flicker once — a power dip that feels like thunder rolling underground.Every screen in the command center flashes […]
Incident Response Readiness
Incident response is the regular practice to identify, mitigate, and report cybersecurity threats. Most organizations aren’t prepared for the inevitable […]
Cyberist Purpose: Rediscovering Meaning in a Digital World
“Kevin, how do you stay so calm?”The intern asks the question like it’s a trick.I glance at the blinking cursor […]
NSA Microsoft Security Alert
The Microsoft communication security flaw that the National Security Agency discovered mainly affects digital security certificates of websites and remote […]
Cyberist Speed: Precision Under Pressure
“Fream, we’re losing uptime.”The voice hits my headset like a tire screeching mid-lap.“How much?” I ask.“Six percent and climbing.”I glance […]
Office 365 Users Unable to Log On with Multi-Factor Authentication
At approximately 9:30 PM CDT on October 18, 2018, Office 365 Multi-Factor Authentication services went down preventing users with this […]
2013 Technology Predictions Recap
The major news topics in technology for 2013 were NSA Prism privacy violations, floundering Healthcare.gov, and huge Twitter IPO. While […]
Open PDF in Office 365
A common reported annoyance is the prompt to Open or Save PDF files from SharePoint Online in Office 365. The following aspects […]
10 Promises Managed Services Customers Should Demand Quarterly
The underlying critical aspect of managed services is providing business acumen to make informed decisions to improve the bottom line. […]
Understanding Azure Site Recovery
Azure Site Recovery provides offline copies of your virtual servers replicated to Microsoft every 15 minutes. Since 2008, the technology has […]
Cyberist Genesis: Designing Digital Human
It’s quiet in the lab except for the steady rhythm of cooling fans and the faint hum of power regulators.Rows […]
Share this:
Like this:
Incompatible Office Products Are Installed on Your Machine
Recently, we’ve begun to receive numerous help desk requests with the following error message: Sorry, we can’t perform this action. […]
CryptoLocker Prevention: Top 12 Defenses Against Business Loss
Despite worldwide publicity concerning the staggering business loss from CryptoLocker (or other variants), few organizations have taken precautions to protect themselves. […]
SharePoint Online Breadcrumb Alternative
Breadcrumb navigation in SharePoint Online 2013 is gone. Despite the numerous dis-information articles on the web that tell you to […]
Firewalls and Cloud Computing
One of the great things about cloud computing is that it lessens the cost and difficulty of protecting the perimeter network […]
Managed Services Pretenders
This customer was in extreme pain. It was hard to understand how they were so patient – for the last […]
Technology Predictions for 2015
2015 will follow the course of last year. As political news rises to a frenzy with the impending 2016 presidential elections, action […]
Cloud Computing vs. Hosting
Cloud Computing and Hosting are not the same thing. Hosting is defined as renting rack space and paying monthly for hosting […]
5 Tips for Picking a Managed Services Provider
For Valentines Day, we thought we’d give you some dating tips. Well really, how to select a managed service provider: […]