Cloud Services

AKA-BLOG

Here you will find articles of interest for your success with IT services and technologies. Learn about current and leading techniques, methods and technologies.

Image

Secure Your Accounts Using App-Based Authentications

In my blog Your Pa$$word doesn’t matter, I laid out the key password vulnerabilities, and in response to a gazillion “but other creds can be compromised, too” DMs and emails, I ...

Image

Digital Transformation – New Technologies to Improve Processes

Business and IT Cadence There is no refuting, the internet has forever changed the way we live, work and conduct business. Innovation has brought the IoT (Internet of Things), d...

Image

Ransomware Attacks in Healthcare: Security Tips to Secure Your Organization’s Data

The outbreak of COVID-19 has put cyberattacks on healthcare providers into hyperdrive. Factors contributing to such attacks include, but aren’t limited to: Decentralized busines...

Image

How To Create Quick Parts and Distribution Lists in Microsoft Outlook

Gain Efficiency in Microsoft Outlook It’s easy to get started with Microsoft Outlook for the basics. However, it is important to explore software deeper to take advantage of the...

Image

8 tips to tighten up your work from home network

Earlier this week, we published an article headlined “If you connect it, protect it.” The TL; DR version of that article is, of course, exactly the same as the headline: if you ...

Image

Microsoft on the counter-attack! Trickbot malware network takes a hit

Good news, for a while at least. Microsoft went to US District Court for the greater good of all of us and came away with a court order permitting it to take over a whole raft o...

Image

The IT Sourcing Model Considerations

What is IT Sourcing and Why Is It Important? Strategic decisions for the IT service portfolio must include how the services will be executed operationally. This will lead to a d...

Image

Every Business is a Technology Business

The Technological Revolutions Alaska Air’s CIO, Varesh Sita, was quoted, “Alaska views itself as a tech company with wings.” Why did Ron van Kemenade, CIO of ING Bank state, “IT...

Image

Russian cybercrime suspect arrested in $1M ransomware conspiracy

Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions...

Image

Top Benefits of Microsoft Outlook

What is Microsoft Outlook? Microsoft Outlook is an information and email manager, available as part of the Microsoft 365 suite. Though primarily an email client, Outlook also in...

Image

Phishing tricks – the Top Ten Treacheries of 2020

Sophos Phish Threat, in its own words, is a phishing attack simulator – it lets your IT department send realistic-looking fake phishes to your own staff so that if they do slip ...

Image

Customer Service in 21st Century

Customer Service in 21st Century Modern Era In the modern era we must understand both the customer experience and track the customer journey. Engagement with customers via the b...

Image

Cybersecurity Awareness and Tips

Cybercriminals Target the Weakest Link Cybercriminals are relentless. The more business protects themselves the more cybercriminals prey on that which the business cannot direct...

Image

How to Avoid and Prevent Email Phishing in Outlook

Here’s an email phishing scam that our own security team received themselves. Apart from some slightly clumsy wording (but when was the last time you received an email about a t...

Image

The Benefits of Microsoft OneDrive Cloud Storage

What is OneDrive? When files are stored in the cloud, the internet is being used to save files to someone else’s servers in a remote location in data centers under the control o...

Image

Business Email Compromise – What it is and how AI Technology can stop and detect fraud.

Business Email Compromise (BEC) It is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they absolutely...

Image

ProLock Ransomware Threat

ProLock ransomware – new report reveals the evolution of a threat Copyright AKAVEIL Technologies LLC all rights reserved Written by Paul Ducklin Let’s start at the very top of t...

Image

Business Continuity vs. Risky Business in 2020

Business Continuity and IT Services When the unexpected happens business functionality may cease and all parties involved will feel the pain, but most especially customers. Rega...

Image

5 Favorite Microsoft Teams Features

This article is one of many promised follow-ups on the topic of Microsoft Teams. Teams is included with Microsoft 365 subscriptions along with all your favorites like Word, Exce...

Image

Servers at risk from BootHole bug

Another month, another BWAIN! That’s our tongue-in-cheek name for a cybersecurity vulnerability that not only gets assigned an identifier like CVE-2020-10713, but also acquires ...

Image

4 Advantages of Microsoft Azure Cloud Solutions

What is Microsoft Azure? Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Micro...

Image

A Guide To Enhance Your Business Productivity

What is Business Productivity? Concerns about productivity are certainly not new. We manage personal productivity every day. Worries about the tasks to be done and how to maximi...

Image

Infrastructure Health with RMM

Technologies must be monitored and managed for optimal performance, reliability, security, and continued availability. Similar to human health, where guidelines for eating, slee...

Image

Key Benefits for Business Assessments in 2020

What is an Assessment? Basically, an assessment is a knowledge tool. It enables you to learn about something and understand its nature or quality. Through understanding the curr...

Image

Managing Your Microsoft Licenses Effectively and Easy

Managing Your Microsoft Licenses Effectively and Easy Managing Your Microsoft Licenses Copyright AKAVEIL Technologies LLC all rights reserved Microsoft Licenses Microsoft offers...

Image

Effective Business Collaboration with Microsoft Teams in 2020

Business Collaboration Collaboration happens when two or more people or a team work together towards a common goal. Effective collaboration requires cooperation, respect and tru...

Image

Why You Need a Firewall? Here’s What You Should Know!

Attacks on home networks are currently increasing during the coronavirus pandemic due to unprotected networks. Most individuals do not understand the importance of a firewall or...

Image

Value Focused Decision Making

The Complexity of Decisions Have you ever made a decision which you later regretted? Everyone can identify with that feeling. However, let’s not lament over the “could have”, “w...

Image

Cybersecurity During COVID-19: Impact and Solution

Do You Have a Cybersecurity Plan? Running a business requires much planning. Strategy, policy, goals, products, and services need to be considered regularly along with who, why ...

Image

Azure Site Recovery (ASR): Recover Lost Data

Azure Site Recovery (ASR): Recover Lost Data Azure Site Recovery is just like the need for an insurance policy such as health, life, property, and liability, it is essential for...

Image

Change Management Best Practices

Prevention of Business Risks Risk of what? Risk of your business not working properly. That might mean unhappy customers, loss of data, lack of customer retention, damaged reput...