Passwords remain the most common way of stealing data
Most of all data thefts at present are based on passwords that are either stolen or weak. If you reuse your passwords, for example, you expose yourself and the company to a higher risk of a breach. We are also trained in creating passwords safely; they must not be too short, and so on. But even t...
“I’ve spent the past year working almost exclusively on security solutions based on Microsoft 365”
I’m a senior IT consultant who’s spend the past 20 years working in a number of different technical areas in the field of IT infrastructure. I’ve worked at a lot of different customers in different sectors, but more recently I’ve been focusing primarily on migrations to the cloud and various kinds of security solutions relating to identity.
Areas of expertise
I’m often in dialogue with customers about which functions they should implement and at what speed. The areas where I have experience include IT infrastructure, security, hybrid environments and cloud migration.
I’ve transferred lots of companies’ email environments to Microsoft 365, from small businesses to companies with thousands of users all over the world. It’s often the first step on a journey that encompasses the securing of identities and the use of many different applications and services from multiple providers. Many multi-factor implementations, often with different scenarios based on where the customer comes from, using which device, etc.
We often help companies with their move into the cloud by migrating the right components to the right provider, with centralised ID management.