Identity Management – Office 365

Identity Management – Office 365

Fulcrum Blog Repeat after me: Microsoft’s Azure Active Directory service is not the same thing as Microsoft’s Active Directory service. This is a very important distinction that everyone in the IT community who’s messing with “the cloud” needs to memorize. Seriously....
Managed Security Models and How They Work

Managed Security Models and How They Work

Fulcrum Blog There’s a popular misconception that small companies can’t grow up to become medium-sized companies until they finally staff their own in-house IT department. Likewise, there’s a parallel notion that medium-sized companies can’t grow up to become large...
Two-Factor Authentication, or Are Passwords Passé?

Two-Factor Authentication, or Are Passwords Passé?

Fulcrum Blog Yes. Yes they are. Join us next month when we discuss…wait, hang on. Is this still something that we need to talk about? Wow… Okay. Fine. Let’s go through the February compromise of the global banking transaction management system. Clever con...
IT skillset development

IT skillset development

Fulcrum Blog Nobody includes DOS proficiency on a résumé anymore. Twenty years ago, declaring that you were adept at using the “new” micro PC operating system was a great way to stand out. Same thing went for people who could use VisiCalc or Lotus 1•2•3; if you knew...
Who does penetration testing?

Who does penetration testing?

Fulcrum Blog In the old days, it didn’t take much to satisfy the CEO and the board of directors that their company’s network was “secure.” Once a year, they’d contract an outside firm – often from the Big Five – to perform a formal audit of the company’s information...