Recent Posts by Jason Pinardi

Jason is a Senior Solutions Architect who has been working at Rutter Networking Technologies for the past 14 years.
Find me on:

Active Directory DNS Considerations in a Cloud Tenant

Once the decision has been made to stage an Active Directory site in a cloud tenant, there are some core principles which should be noted.

Read More

Office 365 Security Concerns

Microsoft recently noted the findings of the "Organizational Security & Compliance Practices in Office 365," a 37-page report conducted by CollabTalk LLC and the Marriott School of Business at Brigham Young University. Key takeaways from this paper are:

Read More

Microsoft: The End is Coming


With 2020 being around the corner, it is important to mindful of the vast wave of Microsoft products which are being end of life.

Read More

Two Factor Authentication for Office 365 (Part 2)

From a Microsoft Azure Active Directory perspective, there are two approaches to MFA:

1. A laser accurate approach specific to the application in the Azure blade using conditional access

2. A global approach managed through the “Multi-factor authentication” page via Office 365

Read More

Two Factor Authentication for Office 365 (Part 1)

Password complexity has been touted for some time to prevent identity theft. Especially in an Active Directory environment. Typical password complexity rules in Active Directory are:

  • Uppercase characters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters)
  • Lowercase characters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters)
  • Base 10 digits (0 through 9)
  • Nonalphanumeric characters: ~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/
  • Any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase. This includes Unicode characters from Asian languages.
Read More

3 Reasons Your Organization Should Choose Hybrid Cloud

Over the past few years, no buzzword in IT has been used more frequently than the cloud. For the beginning of its lifespan, the cloud was thought to be something to approach cautiously. There were security concerns, vendor concerns, and even questions about what it actually was.

Read More

5 Ways to Overcome IT Security Threats

Cybersecurity has become a frequently used term in business these days.

Whether you hear it in the news or in a meeting, most people are aware that businesses everywhere, and every size, are being targeted by cyber criminals. Just recently companies such as Equifax, Netflix, Sonic, and Yahoo! found their names in the headlines as the latest victims. However, the smaller companies that are also victims hardly get a mention even though they account for 43 percent of all incidents, which cost them an average of $879,582 in damages.  

Read More

5 Signs It’s Time to Virtualize Your Legacy Technology

Although we’ve discussed the costs of legacy technology to a business in past blog posts, it’s often only truly apparent that it’s become a major challenge for the business when seen in its totality of incidents. By taking stock of the challenges that your business faces daily, weekly, and monthly in ways that have both short-term and long-term negative consequences, it becomes easier to make decisions about the right time to move to virtualization. In that vein, here are five signs it’s time to virtualize your legacy technology.

Read More

How Does Ransomware Work and How Can You Best Prepare for an Attack?

It’s hard to read the news nowadays without seeing some organization falling victim to a ransomware attack.

How does ransomware work? To put it simply: Ransomware is a form of cyber extortion. When a computer is infected, all of the files on the computer are encrypted. Instructions for how to pay the ransom, and the amount to pay, are displayed on the screen. When the victim pays up, they receive a decryption key that will unlock the files so they can access them once again.

Read More

5 Creative Ways to Address Gaps in IT Resources and Talent

In a recent Indeed survey of more than 1,000 hiring managers and recruiters, more than half (53 percent) of respondents have hired tech talent despite candidates not meeting the job description requirements. That may be a good thing for businesses in need of IT resources to fill gaps in their talent pool. While that alludes to the fact that businesses are working hard to meet their needs for IT talent in what must be creative ways, here are five of those ways that businesses can employ to fill the gaps in IT resources and talent.

Read More