Blog

Sponsorship deal with Conwy Cannons junior basketball team

Oxford Computer Group will be sponsoring the newly-formed Conwy Cannons junior basketball team to help support their quest for success in the North Wales Basketball Association U16 league. The team – which was only formed back in the summer – has already grown to include 13 players, and a coaching team of three. Nick Lamidey,… Read more…

Microsoft Visual Studio Team Services Demo

In my last Identity Management Testing blog, we explored and highlighted the importance of testing, and the benefits doing this could bring to your organisation. This week, before we can start any testing, I want to focus on the tools we use to document and store test results. So, before we get to running tests,… Read more…

OCG Supports Local Charities at Christmas

Oxford Computer Group is proud to support local charities in the run up to this festive season. Instead of sending Christmas cards we have this year decided to make donations to two very worthy causes, in addition to our other charity work throughout the year. The first is close to our South Wales office. Local… Read more…

How to avoid ‘security fatigue’ with Azure AD B2C

A recent NIST Study has found that users are experiencing ‘security fatigue’. Security fatigue is caused by users having to remember yet another password, register for yet another online service, or being told they must do (or not do) something related to IT security. The impact is poor security, which leads to cyber-attacks and lost business.… Read more…

Self-service Password Reset: Steps to stress-free access

Resetting your password in the workplace is rarely as simple as it sounds. As you struggle to recall answers to security questions given years earlier, you won’t be the first to escalate the issue to your IT department. You’ve got pressing deadlines to meet – and you’re desperate! Following a few simple steps, self-service password… Read more…

5 Privileged Access Management (PAM) best practices

As the threat from trusted insiders continues to increase, the need for Privileged Access Management (PAM) has never been greater. Gartner reports that by 2018, 25% of organisations will review privileged activity and reduce data leakage incidents by 33%. Those businesses that aren’t planning to review their privileged activity on a regular basis and follow best… Read more…

Authentication with Azure Active Directory

Azure Active Directory allows access to a number of services, and authentication can be achieved in a number of ways. Outside of the standard deployment, there are federated options, and opportunities to provide secure access for partners and customers. Let’s have a look at how this all works… How users authenticate with Azure AD Azure… Read more…

Identity management testing: Why test?

What comes to mind when you think of Identity Management Testing? Is this the first time you’ve thought about testing? Is it something you push to the back of your mind?  This is the first entry in our seven-part blog series on Identity Management Testing. We will explore and explain why testing is important, and… Read more…