Blog

4 Ways to improve customer engagement in retail – without using an emoji

Perhaps the only thing more bewildering for retailers than the unsympathetic pace of digital disruption is the advent of the term ‘customer engagement’. Isn’t that what your marketing department refer to when they insist that half a week of posting emojis on Twitter is vital for business?   CUSTOMERS EXPECT A SEAMLESS EXPERIENCE A recent… Read more…

How to manage partner identities better with Azure AD B2B

It’s one thing having to manage the identities of users in your organisation’s directory; how tricky must it be to add users from your partners into the mix? The task is perhaps not as great as you’d expect, thanks to Azure AD B2B. Working out the best way to interact with partners, particularly where large numbers… Read more…

Identity: the new security perimeter?

Headlines and industry publications are full of dire warnings about the latest phishing scam or malevolent machinations by cybercriminals. So naturally CISOs focus on their network perimeter in an effort to prevent such exploits. And often they fail. Why? Because no one can control criminal exploits. And with the advent of enterprise mobility and the… Read more…

How does Advanced Threat Protection secure email in Office 365?

Because email is so critical to day-to-day business, it’s become a prime target for cyber attackers looking to gain access to your organisation. With increasingly sophisticated malware campaigns being launched daily and data breaches constantly on the rise, how can you be sure your email environment isn’t exposed? With Advanced Threat Protection for Office 365,… Read more…

Get top marks for student experience with CIAM

With application rates dropping and competition rife, getting top marks in the student experience league table is now the Holy Grail for the education sector. But with the ever-evolving student life cycle now stretching from pre-application to far beyond graduation, it’s imperative that a university’s customer identity and access management (CIAM) solution can facilitate these… Read more…

MIM Sync Engine Debugging: Should You Bother?

So far in the series, we’ve looked at why we test and how we do it. The next logical step might be a blog on how to debug your code in Sync Engine, but – since this article on MSDN covers that well enough, and since there are plenty of other blogs out there on… Read more…

Sponsorship deal with Conwy Cannons junior basketball team

Oxford Computer Group will be sponsoring the newly-formed Conwy Cannons junior basketball team to help support their quest for success in the North Wales Basketball Association U16 league. The team – which was only formed back in the summer – has already grown to include 13 players, and a coaching team of three. Nick Lamidey,… Read more…

Microsoft Visual Studio Team Services Demo

In my last Identity Management Testing blog, we explored and highlighted the importance of testing, and the benefits doing this could bring to your organisation. This week, before we can start any testing, I want to focus on the tools we use to document and store test results. So, before we get to running tests,… Read more…

OCG Supports Local Charities at Christmas

Oxford Computer Group is proud to support local charities in the run up to this festive season. Instead of sending Christmas cards we have this year decided to make donations to two very worthy causes, in addition to our other charity work throughout the year. The first is close to our South Wales office. Local… Read more…

How to avoid ‘security fatigue’ with Azure AD B2C

A recent NIST Study has found that users are experiencing ‘security fatigue’. Security fatigue is caused by users having to remember yet another password, register for yet another online service, or being told they must do (or not do) something related to IT security. The impact is poor security, which leads to cyber-attacks and lost business.… Read more…