<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Options for Office 365 SMTP Relay in Azure


For those trying to relay SMTP with an application in Azure to Office, base guidance and options can be found in the Microsoft article “How to set up a multifunction device or application to send email using Microsoft 365 or Office 365”. In the article, three distinct distinct options are provided for Office 365 relay, noted in the table below:

Read More

The Top 10 Most Important Policies for Your IT Security Strategy

Policies are an essential part of an overall security strategy and are many times under-valued or overlooked completely. Organizations of all sizes often struggle with developing a comprehensive information security strategy due to the challenges of prioritizing where to begin. Strong and effective policies provide an excellent set of resources to help set expectations, provide long and short term goals, and identify gaps that may need to be closed. No matter the maturity level of your organization’s information security strategy, well written policies put you on the right path for continued development.

Read More

Azure Files Sync Considerations - Part 2

Ipart 1 of these series we discussed the merits of Azure file sync. One of the options of this technology is Cloud tiering. This feature of Azure File Sync in which frequently accessed files are cached locally on the server while all other files are tiered to Azure Files based on policy settings. When a file is tiered, the Azure File Sync file system filter replaces the file locally with a pointer, or reparse point. In the event a user needs a file which has been cached, Azure File Sync quietly downloads the file from Azure Files from the cloud.

Read More

Azure Files Sync Considerations - Part 1

Azure file sync is the offering of syncing file information from a file server to a storage account in the cloud. The file server becomes transformed into a local cache of information, and with policies in place, tiering will move older information to the cloud. By doing so, a file server can be extended dramatically.

Read More

Options for Securing VNET Traffic to PaaS Resources in Azure

Historically, one of the challenges of Azure was trying to contain private traffic to resources such as platform-as-a-service (PaaS), Azure files, and Azure SQL. Customers envisioned having a cloud data center with services, and they strived for a vehicle to encapsulate the traffic as they would with a traditional data center.

Read More

Top 10 Security Compliance Policies Your Company Should Have

Information security is a key component of keeping your organization’s data secure. Without proper information security, your company could be vulnerable to cyberattacks, data breaches, or leaks of company-sensitive information. Security policies include processes for accessing and handling information, whether on-site or remotely. 

Read More

Microsoft Exchange 2010 The End Is Near

Microsoft Exchange is a high priority for organizations that rely on email communication internally and externally. IT teams have been anticipating the end date for Exchange 2010 support; similar to other Exchange versions, the support period typically occurs 10 years after the product release. Originally, Microsoft was planning for the extended support end date for Exchange 2010 to be Jan. 14, 2020—the same as Windows 7 and Server 2008. However, the extended support for Exchange 2010 has been pushed back to Oct. 13, 2020.

Read More

Three Boston IT Services Your Business Didn’t Know It Needed

More and more businesses are turning to managed service providers (MSPs) to handle the complex IT solutions required to stay competitive in today’s marketplace. However, some still view the MSP as the guy who fixes the computers when they go down. The role of the MSP has evolved since the days of the single consultant who would come in and reconnect the printer or remove a virus from your computer. 

Read More

Basic Authentication Considerations for Office 365

In order to address security concerns, such as password spray attacks, Microsoft has announced it will end Basic Authentication support on Oct. 13, 2020 for certain protocols. From a risk assessment perspective, the services slated to be blocked as of March 2020 are ActiveSync, POP, IMAP, EWS, and Remote PowerShell.

Read More

5 Considerations for Selecting an Enterprise Wireless Network

Businesses are increasingly feeling the need to re-architect their enterprise networks in order to accommodate the rapidly growing demand for wireless connectivity. Many of them are now compelled to build their own enterprise wireless network to support the influx of mobile devices, Internet of Things, and cloud-based applications, as well as increased adoption of WiFi-hungry practices like BYOD.

Read More