consigliere of your IT administrationABOVE IT

Modern Workplace

Strengthen your organization’s brand reliability

Dear IT Manager, take action now. The marketing department and the information security officer will soon be working together on this matter. 😉 While this might not be entirely the case yet, there is a partial truth behind the provocative headline. BIMI (Brand Indicators for Message Identification) is the latest email security measure following DMARC, […]

Support for Microsoft Exchange 2016 and 2019 ends

Support for Microsoft Exchange 2016 and 2019 ends. October 14, 2025, is a date you should definitely mark in your calendar by now, as that is when official support for Exchange 2016 and 2019 versions ends. This means that version updates, security updates, and technical support will no longer be available. If your organization is […]

You are secure only by updating!

Lauri Blogs

You are secure only by updating. Intune device management provides the framework for centralized endpoint management, but who manages the applications? Lauri discusses this in his blog.

Knowledge Work Playbook for Microsoft 365 Service

Many organizations struggle with their knowledge work. The transition to using Microsoft 365 services is often IT-driven without proper orientation and training for end-users. The number of Teams teams may have gotten out of hand, not to mention naming conventions or owner information. Even Copilot does not provide a shortcut to success in finding information, […]

Virtualization of Workstations and Applications

Office desktop

Virtualization of workstations and applications – what if end users didn’t receive physical workstations when starting their work? This is something I have often pondered. Most people typically have some kind of personal computers both at home and at work, but can an organization require or ask end users to use their own personal devices […]

Why upgrade to Business Premium?

Juha explains why upgrade to Business Premium?

I’m often asked why upgrade to Business Premium? A simple “spoiler” answer: Because it’s the first license level in Microsoft 365 services’ Business licensing that brings information security and data protection services with it, bundled into a comprehensive license package. With it, you can also get rid of an office server or third-party security solutions […]

Engaging Users in Cybersecurity Efforts

Have you ever wondered how to engage users in cybersecurity efforts? Cybersecurity is a vital part of an organization’s operations and competitiveness. Neglecting it can, at worst, temporarily interrupt operations or even paralyze them permanently. Human error is the biggest cause of security incidents. But how can organizations improve their resilience in cybersecurity regarding users, […]

Print management from the cloud!

Print management from the cloud

Would you also like to get rid of print servers? Print management from the cloud? I have been guiding my clients towards SaaS cloud services for over a decade. I remember during the early days of Office 365 services when my then-employer asked if the basic office services could already be built entirely cloud-based as […]

Communication Security Part 2

In the first part of communication security, I discussed message hygiene, specifically how we can better protect ourselves from the misuse of our email domains and enhance message deliverability. This second section will cover what should be considered to safeguard incoming email traffic and our users from malicious messages. Attack Methods Are Evolving Some of […]

Search site:

Search site: