Nuvolex Blog

Enterprise

Securing Your IT Service Desk With RBAC

IT environments play a critical role in the successful operation of any enterprise. However, the same IT environments that enable the smooth running of a business can also pose significant risks if not managed properly. One of the most pressing issues facing organizations IT administrators having unfettered access to enterprise IT environments. In this blog post, we’ll explore the importance of Role Based Access Controls (RBAC) in mitigating the risks of internal security threats to enterprise data.

Read More »
User managing software
Microsoft 365 Management

RMM 2.0 – SaaS Management Platforms

As organizations move their applications and infrastructure to the cloud, effective management of Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) applications becomes increasingly important. However, traditional Remote Monitoring and Management (RMM) tools are not designed to manage SaaS and IaaS applications, which are accessed over the internet rather than through a local network. As a result, SaaS Management Platforms (SMPs) continue to be adopted by IT organizations that have traditionally relied solely on RMM products.

Read More »
Microsoft 365 Management

Updating Microsoft 365

Staying on top of Microsoft’s plethora of updates may seem like a daunting task but, your priorities should shape the way you view Microsoft updates. Microsoft will show you a extensive list of updates depending on if you’re viewing updates from the Microsoft Roadmap or if you are viewing update activities from the Microsoft Message Center. But not everything contained in the Microsoft Roadmap or Message Center requires your attention. For example, Microsoft regularly pushes out updates for Power BI.  Unless your users are using PowerBI quite extensively, these updates might not be relevant and you should simply ignore.

Read More »
MSP

Multitenant Access Best Practices

One of the major pain points we initially wanted to address was ensuring that L1 Service Desk staff not only had easy access to customer tenants, but also access them in a much more efficient and secure manner, ensuring that all IT administrator access was properly delegated and auditable.

Read More »
MSP

Protecting from Insider Threats

For most organizations, the expectation is that IT professionals conduct themselves in a professional manner and prioritize the protection of company and/or customer data above all else. Unfortunately, malicious activity within any IT organization is much harder to prevent and control compared to external threats.

Read More »
Microsoft 365 Management

Enabling MFA with Microsoft 365

When considering deployment of MFA for your End Users, there are three main approaches to consider: Legacy MFA, Security Defaults and Conditional Access Policies.

Read More »