Blog

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Identity and Access Management

Implementing a Zero Trust Model Embracing a Zero Trust security model within your organization can help your company decrease the chances of a potential breach. In this guide, we will share several steps your company can take to implement a Zero Trust approach to security. 1. The first step to setting up a Zero Trust

Jammin’ with James Recapped: Zero Trust with Microsoft Services, Identity and Access Management Read More »

Microsoft 365 renewal time is upon us: here are your options

Overview of Microsoft 365 Licensing Microsoft 365 is a suite of cloud-based productivity tools from Microsoft. It includes familiar applications like Word, Excel, and PowerPoint and powerful collaboration tools like Teams and SharePoint. But to use these tools, you need something called a license. If you’re buying licenses directly from Microsoft or through a CSP

Microsoft 365 renewal time is upon us: here are your options Read More »

Cut the $hIT 2023 Recapped: Five takeaways on Zero Trust Architecture

Plow Networks hosted it’s 2nd annual Cut the $hIT live podcast event this fall, with an excellent panelist lineup including Fortinet’s VP of Engineering, Clearwater’s Chief Risk Officer, Insentra’s CIO/CISO, CRC Group’s Cyber Insurance Specialist, Plow Networks’ Director of Technical Development, and one of Jamf’s Apple Security Specialists. Bryan Link, Plow Networks’ Chief Operating Officer

Cut the $hIT 2023 Recapped: Five takeaways on Zero Trust Architecture Read More »

Cut the $hIT Recapped: The importance of telecom infrastructure and the future of Fiber

Host and Plow Networks’ COO Bryan Link is joined by Executive Vice President at Mears Group, Inc. Trent Edwards to discuss the current state of telecom infrastructure. Having spent over 20 years in the telecom industry, Trent is the perfect person to teach us all about fiber. You’ve definitely heard of fiber, but what is

Cut the $hIT Recapped: The importance of telecom infrastructure and the future of Fiber Read More »

What is technical debt?

Technical debt refers to the inefficiencies and waste that arise when IT resources no longer meet an organization’s needs. It can encompass everything from code and applications to physical hardware. Perhaps the IT asset no longer works well, has become inefficient, uses too much energy, is underutilized, doesn’t integrate with your newer IT resources, or

What is technical debt? Read More »

Why executives should go all-in on Cybersecurity Awareness Month

For almost 20 years, Cybersecurity Awareness Month has generated security awareness for everyday internet users and businesses. But, far from simply being a month of reminders about security best practices of digital users, it’s a chance for IT and business executives to reflect on and recalibrate their organization’s security posture. Technology leaders should pause and

Why executives should go all-in on Cybersecurity Awareness Month Read More »

Scroll to Top