
A month ago at VeeamON, Veeam announced several new features that are coming out for V12. Some of these are major changes and have a lot going on with them,…
A month ago at VeeamON, Veeam announced several new features that are coming out for V12. Some of these are major changes and have a lot going on with them,…
UPDATE: We have changed the color codings to reflect what’s overdue and what’s upcoming in terms of support expirations. Additionally, we’ve updated it to include the changes to the Semi-Annual…
I’ve been in IT for the better part of two decades. In that time, I’ve seen all manner of poor decisions, extremely bad luck, or a whopping combination of both….
In IT, hard drives and hardware fail – this is a fact. Anything that contains moving parts will, given time, cease moving. Aging hardware comes with a slew of direct…
Your workforce plays a vital role in the overall security of your business – whether they know it or not. Security Awareness Training (SAT) provides every employee – regardless of…
Data breaches and thefts have become the new norm in today’s digital world. So much so, in fact, that there is a proper data breach etiquette, and it’s expected. Organizations…
Recently, a few clients came to Mirazon with, what seemed to be, a simple objective – sharing documents easily and securely with internal and external people via OneDrive or SharePoint,…
UPDATED (05/23/22): Microsoft has issued emergency out-of-band (OOB) updates to fix Active Directory (AD) authentication difficulties. The OOB Windows updates are only available through the Microsoft Update Catalog and will…
If you’re looking to enable multi-factor authentication on Google’s G Suite without going through a third party, there is a way to do it. However, before walking down this path…
It’s official – the Internet Explorer desktop application will officially retire on June 15, 2022 for certain versions of Windows 10. It is being replaced with Microsoft Edge, but will…
While the term “social engineering” may not sound very threatening, this type of cyberattack is wreaking havoc on any and every exploitation they come across. The main difference between this…