Resources
Blog

True Hybrid Active Directory Management Solutions: The New Standard | Part 1
True Hybrid Active Directory Management Solutions: The New Standard | A Three-Part Blog Series Over the years, Microsoft Active Directory (AD) has become the core of almost all organizations’ network infrastructures, acting as the central system for identity and access management. The current IT landscape is constantly evolving and has

Microsoft Remote Desktop Protocol (RDP) Vulnerability Discovered
Microsoft Remote Desktop Protocol (RDP) is one of the most popular solutions used to access critical infrastructure servers for many organizations, including those who run virtual servers on Microsoft Azure. A group of hackers, called the Secret Club, inadvertently found a major flaw in Microsoft Remote Desktop Protocol (RDP) technology.

3 Steps to Help Configure Emergency Calling in Microsoft Teams
Microsoft Teams is a powerful tool for collaboration but managing its features can be challenging and time-consuming. Telephony and calling plans for Microsoft Teams requires certain steps to be completed in order to maximize all its features. This blog outlines how to add emergency addresses, associate phone numbers to these

Warning: 12-Year-Old Vulnerabilities Lying Deep in Dell PCs Puts ‘Hundreds of Millions at Risk’
Five vulnerabilities were discovered by researchers from cybersecurity firm SentinelOne in a driver for Dell PCs’ BIOS (the code responsible for launching the PC and its operating system), in particular the DBUtil driver. For 12 years, these “high severity” weaknesses have been resident. Hundreds of millions of devices are at

Is it Time for your Microsoft Enterprise Agreement Renewal?
Resources to Optimize Microsoft 365 (Formerly Office 365) License Management and Reduce Costs For organizations with 500 or more users or devices, that want a more manageable volume licensing program, the Microsoft Enterprise Agreement (EA) provides the ability to buy cloud services and software licenses under one agreement. These enterprise agreements are

New Study Reveals Top Concerns for Microsoft Platform Management
Managing Microsoft environments can be complex and time-consuming, but they provide critical services to maintain business continuity and allow access to employees to keep them productive. Whether on-premises Active Directory, hybrid, or Microsoft 365 (formerly Office 365), IT executives must balance efficiency while maintaining Active Directory security, such as managing

NSA Discovers New Critical Exchange Server Vulnerabilities
Microsoft released three new patches for its Exchange Server software on Tuesday after the National Security Agency (NSA) alerted the company to a fresh batch of critical vulnerabilities. All discovered flaws, four in total, lead to remote code execution on a vulnerable machine. “We urge all owners and operators of

A New Cayosoft.com
We’re excited to announce the new Cayosoft.com! This new and improved site was a true team effort by many at Cayosoft. After seven years it was time to retire our old site and build a new one with a clear goal in mind – make it easy for any visitor, from new-to-the-site to long-time Cayosoft customer, to find the information they need. You’ll notice we’ve not only given our site a clean, new

Disgruntled IT Contractor in Jail | Protect Against Insider Threats
Large-scale internal security breaches are becoming increasingly more popular, costing companies millions of dollars each year. The sum of this loss comes from the financial damages of the breach itself and, in some cases more importantly, damage to the company’s reputation, translating to big dollars off the company’s bottom line.

Cayosoft Announces Management and Protection Suite for All Microsoft Environments
Cayosoft is pleased to announce the latest release of its Management and Protection Suite, which enables organizations to manage, monitor, and protect Microsoft services, users and identities – including on-premises, Microsoft 365, and hybrid environments – in a single offering. The Suite includes Cayosoft Administrator v8 and Cayosoft Guardian v2.

Cayosoft Names Binary Tree Veteran Patrick Sack CRO Amid 130% Annual Recurring Revenue
Veteran industry executive joins leading hybrid Microsoft management and protection company to help further accelerate Cayosoft revenue growth. Cayosoft, the leading hybrid Microsoft management and protection company, today announced that Patrick Sack has joined the company as Chief Revenue Officer. A senior executive from Binary Tree (now part of Quest

2020: A Year in Review
Wow, 2020 — A year to remember, to say the least! Despite a global pandemic, so much was accomplished at Cayosoft and across the tech community. People adjusted to a “new normal” as we flocked to Microsoft Teams, which now has more than 115 million daily active users. And we know that pushed IT Teams

The #1 Way to Prevent Insider Threats
Protecting Your Critical Assets with Insider Threat Prevention Data Breaches Happen Data security is nothing new. Where there is sensitive information, there are those who seek to access, steal, and misuse it, mostly for financial gain. The unfortunate truth about malicious activities is that a third of all data breaches

Security Budgets During COVID-19 – A New Infographic
When lockdown protocols kicked in due to COVID-19’s rapid spread all around the world, teams across many industries migrated to a work-from-home normal. However, with remote work comes new security risks—like employees accessing sensitive company assets through personal devices and home wifi. How have security budgets changed as a result

Real-World Use Case: Save Time, Ensure Control in Hybrid Microsoft
At Citrus Health Network, a health center organization, the nature of the business means many accounts must be provisioned and deprovisioned every month. Yet with 1200 employees, the company has only four people on the infrastructure team, making efficiency critical. It would require a solution that offers secure delegation. Secure delegation