Author name: Molly Bacurin

Reboot Your Network with Ryan Recapped: Proactive Problem Management

This month’s webinar is all about proactive problem management. Ryan Harris, our Director of Service Delivery, discusses the differences between incident and problem management and how you can proactively monitor your network to prevent recurring issues. What is Problem Management? Problem management is a process aimed at identifying and managing the root causes of incidents [...]

Reboot Your Network with Ryan Recapped: Proactive Problem Management Read More »

Jammin’ with James Recapped: The Modern Workplace Approach to MDM/BYOD

In this month’s webinar, James Golden, Plow Networks’ Director of Technical Development, discusses the differences between BYOD and MDM policies. In this article, you will learn about enrollment types for Apple and Android, which will help you determine what type is best for your business. To start, here are some definitions: BYOD: Bring Your Own

Jammin’ with James Recapped: The Modern Workplace Approach to MDM/BYOD Read More »

Reboot Your Network with Ryan Recapped: Change Control System

This is the first entry in our series on optimizing your network infrastructure. In this month’s webinar, Plow Networks’ Director of Service Delivery, Ryan Harris, provides tips and strategies to help you establish an effective change control system. What is Change Control? Change control is the process that management uses to identify, document, and authorize

Reboot Your Network with Ryan Recapped: Change Control System Read More »

Jammin’ with James Recapped: Transforming the Workplace with Microsoft Teams

Key Features and Licensing Options In this month’s webinar, James Golden, Director of Technical Development at Plow Networks, highlights key features of Microsoft Teams and how to determine the best licensing option for your business. Teams is Microsoft’s secure communications platform that allows your team to collaborate within and across departments. Information is encrypted and

Jammin’ with James Recapped: Transforming the Workplace with Microsoft Teams Read More »

Jammin’ with James Recapped: Cost Optimization with Microsoft Azure

Reserved Instances This is the final entry into our two-part series on cost optimization. In this month’s webinar, James demonstrates how to use Microsoft’s Azure Portal to minimize your organization’s subscription costs. One way to do this is by reserving instances. Reserved instances are agreements made with Microsoft to use a certain service or product

Jammin’ with James Recapped: Cost Optimization with Microsoft Azure Read More »

The People of Plow: Getting to know our Endpoint Systems Administrator

Meet Emmanuel Tsavaris Meet Emmanuel Tsavaris, our Endpoint Systems Administrator. Emmanuel has worked at Plow Networks since December 2020, after leaving Apple to step away from the corporate environment. He first heard about the company from our Director of Support Services. For Emmanuel, a typical day consists of various tasks, such as proposing and implementing

The People of Plow: Getting to know our Endpoint Systems Administrator Read More »

Jammin’ with James Recapped: Cost Optimization with Microsoft 365 Licenses

Key Strategies for Cost Optimization This is the first entry into our two-part series on cost optimization. In this month’s webinar, James discusses using Microsoft 365 services to minimize your licensing costs, such as checking for unassigned licenses and reserving instances. On M365maps.com, you can compare the different licensing plans that Microsoft offers side-by-side. This

Jammin’ with James Recapped: Cost Optimization with Microsoft 365 Licenses Read More »

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Data Protection and Threat Intelligence

This continues our series about implementing Zero Trust with Microsoft Services. If you missed our post about device trust and security, you can check it out now. This guide will show you how to use sensitivity labels and threat intelligence to protect your Microsoft environment from cyber-attacks. Labels: Sensitivity labels are an essential aspect of

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Data Protection and Threat Intelligence Read More »

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Device Trust and Security

Implementing Zero Trust for Device Security This continues our series about implementing Zero Trust with Microsoft Services. If you missed our previous post about identity and access management, check it out now.  In this guide, we will share tips to help you ensure the safety of your company’s devices. 1. One way to mitigate risk

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Device Trust and Security Read More »

Scroll to Top