Blog

OCG employees raise over £3,000 for two South Wales charities

It was a beautiful day in South Wales. The sun was shining, and there was hardly a cloud in the sky. Ten intrepid OCG employees set off on a fifteen-mile trek, accompanied by “Fraser Bear”, the mascot of one of OCG’s chosen charities, Believe. The trek would take in two of South Wales’ highest peaks,… Read more…

Why linking HR and IT is crucial to identity management

When it comes to provisioning and deprovisioning user accounts, IT departments often don’t know who’s who in the organisation, or who should have access to what. They rely on being fed data by human resources (HR), the custodians of employee data. But how is this managed? How can users be managed in different environments based… Read more…

4 Ways to improve customer engagement in retail – without using an emoji

Perhaps the only thing more bewildering for retailers than the unsympathetic pace of digital disruption is the advent of the term ‘customer engagement’. Isn’t that what your marketing department refer to when they insist that half a week of posting emojis on Twitter is vital for business?   CUSTOMERS EXPECT A SEAMLESS EXPERIENCE A recent… Read more…

How to manage partner identities better with Azure AD B2B

It’s one thing having to manage the identities of users in your organisation’s directory; how tricky must it be to add users from your partners into the mix? The task is perhaps not as great as you’d expect, thanks to Azure AD B2B. Working out the best way to interact with partners, particularly where large numbers… Read more…

Identity: the new security perimeter?

Headlines and industry publications are full of dire warnings about the latest phishing scam or malevolent machinations by cybercriminals. So naturally CISOs focus on their network perimeter in an effort to prevent such exploits. And often they fail. Why? Because no one can control criminal exploits. And with the advent of enterprise mobility and the… Read more…

How does Advanced Threat Protection secure email in Office 365?

Because email is so critical to day-to-day business, it’s become a prime target for cyber attackers looking to gain access to your organisation. With increasingly sophisticated malware campaigns being launched daily and data breaches constantly on the rise, how can you be sure your email environment isn’t exposed? With Advanced Threat Protection for Office 365,… Read more…

Get top marks for student experience with CIAM

With application rates dropping and competition rife, getting top marks in the student experience league table is now the Holy Grail for the education sector. But with the ever-evolving student life cycle now stretching from pre-application to far beyond graduation, it’s imperative that a university’s customer identity and access management (CIAM) solution can facilitate these… Read more…

MIM Sync Engine Debugging: Should You Bother?

So far in the series, we’ve looked at why we test and how we do it. The next logical step might be a blog on how to debug your code in Sync Engine, but – since this article on MSDN covers that well enough, and since there are plenty of other blogs out there on… Read more…

Sponsorship deal with Conwy Cannons junior basketball team

Oxford Computer Group will be sponsoring the newly-formed Conwy Cannons junior basketball team to help support their quest for success in the North Wales Basketball Association U16 league. The team – which was only formed back in the summer – has already grown to include 13 players, and a coaching team of three. Nick Lamidey,… Read more…

Microsoft Visual Studio Team Services Demo

In my last Identity Management Testing blog, we explored and highlighted the importance of testing, and the benefits doing this could bring to your organisation. This week, before we can start any testing, I want to focus on the tools we use to document and store test results. So, before we get to running tests,… Read more…