4 Techniques to Optimize Jet Reports for Faster Run Times

Oh, if only there were a set of steps that, if followed, would guarantee a fast Jet Report. Given the nuances and intricacies in the design of many reports, combined with other factors, like the more complex database structure of BC compared to NAV, the size of your data, and your network or internet speed,… Continue reading 4 Techniques to Optimize Jet Reports for Faster Run Times

Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls

As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls

Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Password Security and Protection Has Never Been More Important

How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important

Remaining Vigilant: External threat detection with OSINT

For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT

Phishing, Quishing, Vishing, and Smishing

Just when you thought it was safe to go back in the water… Most people are familiar with the term “phishing,” which describes emails sent by malicious hackers to coax the email recipient (the victim) into clicking on a link that asks them to divulge personal information or login credentials. Sometimes, the victim’s computer is… Continue reading Phishing, Quishing, Vishing, and Smishing

Popdock Technology Elevates Visibility of Historical Data in Dynamics GP to Business Central

Migrating historical data for GP customers to Microsoft Dynamics 365 Business Central can cause a good deal of concern due to complexity, costs, and preferred data formats. But companies rely on historical data and want access to older accounts, sales orders, inventory summaries, and invoices. One solution to help companies move forward and avoid a… Continue reading Popdock Technology Elevates Visibility of Historical Data in Dynamics GP to Business Central

How To Use Visual Studio Code to Create Cybersecurity Defense Playbooks for Routine Preventative and Detection Tasks

When performing IT maintenance and identifying issues from a cyber-risk/cyber-defense perspective, you can use playbooks. Users can create playbooks easily using Visual Studio and can be used for a variety of system administrative tasks. In this blog, we discuss how create playbooks for routine preventative and detective tasks related to cybersecurity defense. How Microsoft Used… Continue reading How To Use Visual Studio Code to Create Cybersecurity Defense Playbooks for Routine Preventative and Detection Tasks

5 Ways to Protect Your Business from Cyber Attacks

Protecting Your Business from Cyber Attacks: Getting Started  We all know that cyber attacks are becoming more and more pervasive, sophisticated, and damaging. A recent report in EC Council’s CISO Mag found that:   And it isn’t just large companies (and utilities and government agencies) that are at risk; organizations of every size are under attack. In fact, because smaller companies have limited budgets and resources, they can be… Continue reading 5 Ways to Protect Your Business from Cyber Attacks

How to Use the PowerPoint Option in Microsoft Teams

There are always new features that are introduced by Microsoft in their productivity tools that, at this point, can warrant a monthly status update about what’s new and what’s changed. This one I feel deserves extra attention. If you share a PowerPoint presentation during a Teams Meeting, this one will make your life better. When you… Continue reading How to Use the PowerPoint Option in Microsoft Teams