Blog

How does Advanced Threat Protection secure email in Office 365?

Because email is so critical to day-to-day business, it’s become a prime target for cyber attackers looking to gain access to your organisation. With increasingly sophisticated malware campaigns being launched daily and data breaches constantly on the rise, how can you be sure your email environment isn’t exposed? With Advanced Threat Protection for Office 365,… Read more…

Get top marks for student experience with CIAM

With application rates dropping and competition rife, getting top marks in the student experience league table is now the Holy Grail for the education sector. But with the ever-evolving student life cycle now stretching from pre-application to far beyond graduation, it’s imperative that a university’s customer identity and access management (CIAM) solution can facilitate these… Read more…

MIM Sync Engine Debugging: Should You Bother?

So far in the series, we’ve looked at why we test and how we do it. The next logical step might be a blog on how to debug your code in Sync Engine, but – since this article on MSDN covers that well enough, and since there are plenty of other blogs out there on… Read more…

Sponsorship deal with Conwy Cannons junior basketball team

Oxford Computer Group will be sponsoring the newly-formed Conwy Cannons junior basketball team to help support their quest for success in the North Wales Basketball Association U16 league. The team – which was only formed back in the summer – has already grown to include 13 players, and a coaching team of three. Nick Lamidey,… Read more…

Microsoft Visual Studio Team Services Demo

In my last Identity Management Testing blog, we explored and highlighted the importance of testing, and the benefits doing this could bring to your organisation. This week, before we can start any testing, I want to focus on the tools we use to document and store test results. So, before we get to running tests,… Read more…

OCG Supports Local Charities at Christmas

Oxford Computer Group is proud to support local charities in the run up to this festive season. Instead of sending Christmas cards we have this year decided to make donations to two very worthy causes, in addition to our other charity work throughout the year. The first is close to our South Wales office. Local… Read more…

How to avoid ‘security fatigue’ with Azure AD B2C

A recent NIST Study has found that users are experiencing ‘security fatigue’. Security fatigue is caused by users having to remember yet another password, register for yet another online service, or being told they must do (or not do) something related to IT security. The impact is poor security, which leads to cyber-attacks and lost business.… Read more…

Self-service Password Reset: Steps to stress-free access

Resetting your password in the workplace is rarely as simple as it sounds. As you struggle to recall answers to security questions given years earlier, you won’t be the first to escalate the issue to your IT department. You’ve got pressing deadlines to meet – and you’re desperate! Following a few simple steps, self-service password… Read more…

5 Privileged Access Management (PAM) best practices

As the threat from trusted insiders continues to increase, the need for Privileged Access Management (PAM) has never been greater. Gartner reports that by 2018, 25% of organisations will review privileged activity and reduce data leakage incidents by 33%. Those businesses that aren’t planning to review their privileged activity on a regular basis and follow best… Read more…

Authentication with Azure Active Directory

Azure Active Directory allows access to a number of services, and authentication can be achieved in a number of ways. Outside of the standard deployment, there are federated options, and opportunities to provide secure access for partners and customers. Let’s have a look at how this all works…   How users authenticate with Azure AD… Read more…