I’m a cybersecurity practitioner, modern workplace professional, people leader, MSP veteran, content creator, husband, and father.

Hi, I’m Dom.

I’ve been in technology for over twelve years, starting out in the classic starting point of support during my sophomore year of high school. I’ve since grown my career and today I work in digital transformation and cybersecurity in the SMB arena. I’m here to evangelize and raise the tide so that everyone can live a more secure digital life.

NordLayer control panel members/users screen

NordLayer Review: Setup and First Thoughts

In July, Pax8 announced a new partnership with Nord Security. I was particularly excited about this launch due to their NordLayer product and the promise of a simple to use SASE service with capabilities like single sign on, private gateways/servers and site to site...

There’s Always Another Attack Vector

Microsoft recently made a big jump in the security of the Office suite by finally blocking macros by default! However, when we plug one hole, threat actors will simply find a new hole, and thus the cycle shall continue.

Have You Considered Adding SASE?

Now that the new normal is work from anywhere, we've got a major limitation on our hands: network protection. We can solve some of this with DNS filtering, which does indeed do an excellent job at web reputation protection. After all, the majority of the world's...

Dear Security Vendors: We Need to Talk

It's not us, it's you. We need to talk about marketing and how we should be presenting our products and services to newer practitioners in our space. For too long now, there's been this marketing trend of "100% protection." It's got to stop. The Truth About...

Handling NCE – Part 2

Back in January, I shared some ideas around how I'd personally approach NCE. To this day, it's one of my most popular posts. To that end, I thought I should elaborate on some of the contract ideas I'd shared previously. Before we get Started Keep in mind that my model...

Conditional Access Templates are Coming in Hot

One of the bigger challenges with Conditional Access is baselining your security templates. As Microsoft so eloquently put it, Identity is the New Battleground, so we must set baselines everywhere. After much waiting, Microsoft is rolling out templatized, best...

Microsoft, Google, and Apple Agree on Passwordless

I never envisioned myself writing about these three companies agreeing, but here we are. And the news is fantastic. I've long been a proponent of passwordless authentication flows, which is really just a buzzword for relying on different factors such as biometrics and...

How does your MSP’s Team Identify?

As a trusted technology provider and business advisor, your MSP has some serious horsepower. It's why Matt and I are constantly talking about the importance of locking down your own house. You, the IT provider, could wreck livelihoods if something went drastically...

Driving Better Employee Experience

We live in a time where we can live a seamless technological life in our personal world. What do I mean? Should we choose to, we can tell our home goodnight and all the right things happen. The lights turn off, the thermostat sets to the right temperature, maybe our...

We Need a Federal Privacy Law

I was perusing one of my favorite cyber news spots, The Record, and stumbled on this article: Connecticut inches closer to becoming fifth state with data privacy law - The Record by Recorded Future. Privacy laws are a good and crucial step forward, especially because...