banner-why-daymark.jpg

Information Technology Navigator

Tips, Advice & Insights from Technology Pros

Corey Roberts

Recent Posts

Microsoft Teams – 10 Deployment Tips

Microsoft Teams is the cloud-based collaboration solution in the Office 365 suite that integrates business messaging, calling, video meetings and file sharing. It is Microsoft’s replacement for Skype for Business.

Read More
Thu, Nov 21, 2019
Share:   

Understanding Office 365 Impossible Travel

Impossible travel. Is it sending a human to Saturn or Venus? Well maybe, but in the context of Microsoft Office 365, Impossible Travel is a security feature that is a great indicator of potential hacking attempts. The concept is straightforward. If you login to Office 365 from your office in Boston and then 20 minutes later you try to login from Dallas, or you login from home in Chicago and five hours later from Beijing, Office 365 basically says “wait a minute, that’s impossible” and it denies login from Dallas and immediately sends an IT security alert.

Read More
Wed, Oct 23, 2019
Share:   

Key Considerations for an Azure Deployment -  Part 2

In part one of our blog, Key Considerations for an Azure Deployment,  Corey Roberts, Daymark’s Director of Managed and Cloud Services, addressed some of the common questions clients have regarding migrating workloads to Azure. Now he moves on to talk about benefits, application performance, and how to best prepare for an Azure deployment.

Read More
Mon, Feb 05, 2018
Share:   

Key Considerations for an Azure Deployment

Microsoft’s Azure cloud has emerged as a leader in the public cloud market. It provides the agility, scalability, security and cost-efficiency today’s enterprises need. In this 2-part blog, Corey Roberts, Daymark’s Director of Cloud and Managed Services, answers the common questions clients have before, during and after an Azure deployment. 

Read More
Mon, Jan 29, 2018
Share:   

Don’t Click that Link! Why Phishing Continues to Work

Cybercriminals continue to use phishing attacks on individuals within enterprises. With increased sophistication and multiple attack vectors, businesses must be vigilant at every step of the way to prevent infiltration. Let me share a recent example-

Today I received an email from a recruiter. It’s not out of the ordinary for recruiters to ping us with resumes hoping that we will see a fit for their candidate. This one was well written, had a company logo, and a picture of the sender. Including pictures is a growing trend with recruiters

Read More
Thu, Jul 06, 2017
Share: