I’m a cybersecurity practitioner, modern workplace professional, people leader, serial entrepreneur, content creator, husband, and father.

Hi, I’m Dom.

I’ve been in technology for over twelve years, starting out in the classic starting point of support during my sophomore year of high school. I’ve since grown my career and today I work in digital transformation and cybersecurity in the SMB arena. I’m here to evangelize, and raise the tide so that everyone can live a more secure digital life.

How does your MSP’s Team Identify?

As a trusted technology provider and business advisor, your MSP has some serious horsepower. It's why Matt and I are constantly talking about the importance of locking down your own house. You, the IT provider, could wreck livelihoods if something went drastically...

Driving Better Employee Experience

We live in a time where we can live a seamless technological life in our personal world. What do I mean? Should we choose to, we can tell our home goodnight and all the right things happen. The lights turn off, the thermostat sets to the right temperature, maybe our...

We Need a Federal Privacy Law

I was perusing one of my favorite cyber news spots, The Record, and stumbled on this article: Connecticut inches closer to becoming fifth state with data privacy law - The Record by Recorded Future. Privacy laws are a good and crucial step forward, especially because...

I Discovered an Outlook on the Web Feature I LOVE

If you're anything like me, it's common for you to book calls with folks across time zones. I frequently find myself booking calls with folks all over the country, and now that Pax8 is international, all over the world! I've become good at translating US time zones on...

Stop Using Magic Links

Click here to get a link to login. Magic links are suddenly everywhere, and I simply refuse to accept the logic behind them. Before I rant a bit about why you shouldn't be using them, let's talk through the basic concept behind it: At a high level, magic link...

Imposter Syndrome is a Sign of Progress!

We've all been there; in fact I feel like I'm there all the time. Imposter syndrome is real, in almost every industry. As we move up in our careers, tackle new challenges, or start to educate others, it sets in. We start to feel inadequate in our own world. It can be...

Will there be a cyber war?

As a cyber nerd, my first question when tensions went up in the region was 'what are the cyber implications?' The atrocities happening in Europe are shocking for everyone, and this is certain to be in history books in the same way 1939 is. However, it's different. I'm...

No More Third-Party MFA for Delegated Admin

In a subtle update to the Microsoft Partner Security Requirements article on February 24th, Microsoft precludes the use of third-party MFA for partners wanting to take advantage for Delegated Admin Privileges (DAP) or Granular Delegated Admin Privileges (GDAP). They...

It’s Time: Drop Persistent Remote Access

Threat actors are using your infrastructure for command and control as a service! When it first became a thing, remote controlling a computer was a thing of magic. So much "how are you doing this?!" Threat actors have caught onto this. Creating one convenient place to...

Modern Security Baby Step: Safe Links and Safe Attachments

In my previous Baby Steps episode, we reviewed smart ways to implement data loss protection for every client. This episode focuses more so on outward protection with Safe Links and Safe Attachments in Defender for Office 365. This is available as a part of the...