Microsoft InTune Permissions and Privacy

business team with cyber security in place working at computers 1

Microsoft InTune Permissions and Privacy You are thinking of switching to Microsoft InTune security tools & processes, and naturally, you have a few questions about the permissions InTune asks for on each device and your privacy. We address those concerns and demonstrate that neither InTune or your IT management services team are not using InTune…

Read Full Post

How to prevent data loss with a remote work team?

secure remote work solutions concept 672dps09awq

How to prevent data loss with a remote work team? Enabling Data Loss Prevention for Remote Work on a Budget For most companies in Canada, working remotely was not a choice, and the transition was rushed during a crisis. Consequently, companies, especially SMBs are unprepared for the various risks that come with remote work. Canadian…

Read Full Post

How to Use Microsoft Identity Manager (MIM)?

identity management concept 98c64splf51

How to Use Microsoft Identity Manager (MIM)? Even though more and more Canadian businesses are reopening, many have decided to continue with their remote work and Bring Your Own Device (BYOD) arrangements. A 2021 McKinsey survey found that 9 out 10 organizations will rely on remote and on-site working in 2022 for increased productivity. If…

Read Full Post

Using Microsoft Intune to Protect Employee Devices

Using Microsoft Intune to Protect Employee Devices hero image

Using Microsoft Intune to Protect Employee Devices According to a recent survey of 1,400 CIS officers in 14 countries (including Canada), 63% of Canadian businesses have seen a rise in targeted cyber attacks since switching to remote work. According to the Canadian Federation of Independent Businesses, more than a quarter of their 3,040 members have…

Read Full Post

How To Reduce the Cost of BYOD in 5 Steps

How To Reduce the Cost of BYOD hero image

How To Reduce the Cost of BYOD in 5 Steps Many small businesses in Canada are making remote work a permanent part of their business. However, not everyone is doing this with the same efficiency (or profitability). For instance, an Oxford Economics study found that organizations that provide employees with devices spend more on average…

Read Full Post

Remote Working Solutions for Businesses in Canada in 2022

Remote Working Solutions Canada hero

Remote Working Solutions for Businesses in Canada in 2022 Contents Making the Switch Getting started Choosing between the best remote working options Avoid VPN Solutions Azure + Windows Virtual Desktop Azure Active Directory + Microsoft Intune + 365 The Important Of Device Management Implementing the right solution According to a recent survey from PwC, companies…

Read Full Post

Remote Working with Microsoft 365

secure remote work solutions with microsoft 365 - hero 2

Remote Working with Microsoft 365 Work from home transitions may not have gone as smoothly or securely as you would like, as they were likely done in a hurry earlier this year. However, now you can step back and secure your remote work infrastructure and reinvent how your team works – and where you re-allocate…

Read Full Post

Risks Of Insecure Work From Home Solutions

Risks Of Insecure Work From Home Solutions

Risks Of Insecure Work From Home Solutions Never before has there been a sudden rush to pick up and move from the office to isolation – but the risks of rushed insecure work from home solutions are real – and you need to pay heed. A little planning can go a long way to reducing…

Read Full Post

Work From Home Solutions for Coronavirus Management

woman working from home office

Work From Home Solutions for Coronavirus Management If you are still struggling to get your staff ‘Work From Home (WFH)’ ready, we can help. Coronavirus has hit many businesses hard, and as businesses are scrambling to create secure work from home solutions, our team at TUCU is all hands on deck to make that happen…

Read Full Post

What is Identity Access Management (IAM)?

what is identity access management - cover image

What is Identity Access Management (IAM)? An Introduction to Identity and Access Management (IAM) IAM, short for Identity and Access Management, is a framework of policies, processes, and technologies to provide business owners and IT managers control over users who access their organization’s network or cloud accounts. The IT department, or your Managed Services Provider…

Read Full Post