Blog

100 posts

My 2026 Cyber and Other Predictions
ai business cybersecurity

My 2026 Cyber and Other Predictions

Dec 23, 2025

It’s hard to believe 2025 is already wrapping. As is pseudo-tradition, I wanted to share a couple of thoughts on how I think 2026 will go and review my original...

Read more
About That Tech Debt
ai automation digital-transformation

About That Tech Debt

Dec 9, 2025

In my last post, I talked about the “agent hype” we’re all dealing with. The pressure to leverage AI when AI might not be the right solution for the presented p...

Read more
AI is Slowing you Down
ai automation

AI is Slowing you Down

Dec 8, 2025

Click bait title is click bait, but I have a point here. AI is our new obsession, and the current demand is for “agents.” Agents are going to change the world t...

Read more
Windows Hello IS MFA
cybersecurity

Windows Hello IS MFA

Sep 23, 2025

There’s a long-standing debate sort of storming the security community that seems to refuse to die: is Windows Hello, Apple Touch ID, or Android’s credentialing...

Read more
Nobody Cares About Your Tech Stack
ai business

Nobody Cares About Your Tech Stack

Aug 26, 2025

The almighty tech stack. The best EDR, rock solid email security. “Enterprise technology for the SMB.” I could go on for a while with all the clichés, and I use...

Read more
Windows is a Mess
microsoft opinion

Windows is a Mess

Jul 19, 2025

I've been a Windows user for as long as I've been a computer user for the most part. I've dabbled in Mac, used plenty of Linux distros. But, day-to-day, I still...

Read more
Communicating Outages Out of Band
business cloud msp

Communicating Outages Out of Band

Mar 4, 2025

Over the weekend (on 3/1 to be exact), there was a significant outage at Microsoft impacting primarily Exchange Online but also some other services. Even though...

Read more
Let's Stop Device Code Phishing!
cybersecurity modern-workplace

Let's Stop Device Code Phishing!

Feb 17, 2025

Device code phishing is a real threat that often goes unmitigated. Microsoft's recent warning that threat actor Storm-2372 is actively executing a device-code p...

Read more
Ready. Set. (Entra) Passkey!
cybersecurity guides

Ready. Set. (Entra) Passkey!

Nov 25, 2024

Now that Passkeys are generally available, we can start thinking of strategies to implement phishing resistant authentication in our environments! Microsoft has...

Read more
Mandatory MFA is Finally Upon Us
cybersecurity microsoft

Mandatory MFA is Finally Upon Us

Sep 8, 2024

We're a little over a month out from Microsoft's upcoming MFA mandate. On October 5th, 2024, the Entra Admin Center, Intune Admin Center, and Azure portal will ...

Read more
Data Loss Prevention for Any SMB
cybersecurity guides

Data Loss Prevention for Any SMB

Jun 15, 2024

It's time for a new guide for MSPs! The Safeguards within CIS Control 3 speak to the need for proper Data Protection. Implementation Group 1 (i.e.: the minimum ...

Read more
CISA's Secure by Design Pledge
cybersecurity news

CISA's Secure by Design Pledge

May 9, 2024

In some very exciting news today, CISA announced their Secure by Design Pledge. The Secure by Design Pledge is a voluntary commitment that was signed by 68 soft...

Read more
Tips for a Successful MFA Rollout
cybersecurity reports

Tips for a Successful MFA Rollout

May 4, 2024

IMPORTANT NOTE: I'm trying something new here and looking for feedback (on LinkedIn). I've written this post using Microsoft Copilot by creating a general outli...

Read more
Trying a New Task Management Tool
business modern-workplace

Trying a New Task Management Tool

May 3, 2024

If you know me, you know I've been a longtime proponent of Microsoft To Do and its vast integrations across the Microsoft ecosystem. To this day, Microsoft To D...

Read more
Data Classification for All
cybersecurity guides

Data Classification for All

Mar 5, 2024

I figured I would expand on my Purview Information Protection information by creating a general guide around information protection labels. In this guide, I tak...

Read more
Copilot's Impact on Cybersecurity
ai cybersecurity

Copilot's Impact on Cybersecurity

Feb 14, 2024

A lot of us, me included, have spelled out some "doom and gloom" about AI and its impact on cybersecurity. Truth is, there's a lot to worry about, especially fo...

Read more
Practically Remote: Leadership
business practically-remote

Practically Remote: Leadership

Feb 6, 2024

A lot of folks I work with say that managing remote teams is dramatically different than managing in person teams. In many ways, I agree. However, I also think ...

Read more
Practically Remote: Company Dynamics
business practically-remote

Practically Remote: Company Dynamics

Dec 19, 2023

For the first iteration of ‘practically remote,’ I think the topic of “company dynamics” make the most sense. You could also think of it as company structure, b...

Read more
Practically Remote: Introduction
business career practically-remote

Practically Remote: Introduction

Dec 18, 2023

We’re coming up on 2024, innovation is upon us. Technology enables us to truly make work a thing we do, and not a place we go. Despite the fact that secure and ...

Read more
The Joy of Killing Servers
digital-transformation modern-workplace

The Joy of Killing Servers

Dec 12, 2023

I felt like making a fun post and was just recently reminiscing with someone about the joy of getting rid of servers. in my own technology practice, servers wer...

Read more
Normalize Asynchronous Collaboration
business career modern-workplace

Normalize Asynchronous Collaboration

Oct 23, 2023

There seems to be a rather unfortunate crusade against work from home and even hybrid work. There's a number of predicted problems that are driving this type of...

Read more
AI is not a Red Pill
cybersecurity

AI is not a Red Pill

Sep 11, 2023

Listen, I'm just as excited about artificial intelligence as everyone else. However, like with many things, I am firmly in the camp of "proceed with caution." A...

Read more
Electronic vs Digital Signatures
business cybersecurity

Electronic vs Digital Signatures

Jul 27, 2023

Some time ago, I posted about certificate authentication, and certificates themselves. In those articles, I mentioned digital signatures and made a really small...

Read more
To IaaS or not to IaaS?
cybersecurity digital-transformation

To IaaS or not to IaaS?

Jun 4, 2023

IaaS (Infrastructure as a Service) might just be the cloud in its purest form. It truly is just "renting someone else's" computer. Because of that, IaaS offers ...

Read more
Supply Chain Attacks: On the Rise
cybersecurity

Supply Chain Attacks: On the Rise

Apr 7, 2023

The 3CX incident marked another highly successful supply chain-based attack, believed to be attributable to DPRK (North Korea) state sponsored actors. I won't b...

Read more
I Moved to 1Password
cybersecurity

I Moved to 1Password

Mar 1, 2023

\[box\] Everyone is responsible for their own security. Me liking a product is not an endorsement of how secure it will be for you. Security is never 100%\[/box...

Read more
How I Protect My Kids Online
cybersecurity safety

How I Protect My Kids Online

Feb 25, 2023

This is a particularly hot topic, and one I'm asked about relatively often. I figured I would cover it here... how do I go about protecting my kids when they're...

Read more
What if my cloud provider dies?
business cloud cybersecurity

What if my cloud provider dies?

Dec 4, 2022

This weekend has been marred by an ongoing outage at major cloud provider Rackspace that is impacting their entire Hosted Exchange offering. After a full day of...

Read more
What is a certificate anyways?
cybersecurity

What is a certificate anyways?

Nov 23, 2022

Following up on my last post about certificate-based authentication, I thought I would break down for the masses what a certificate is exactly. This isn't reall...

Read more
What is domk.pro?
content cybersecurity

What is domk.pro?

Oct 14, 2022

"Hey Dom, this link looks phishy." I was amazed when somebody actually noticed I was using a custom short linking tool on a social post. To be honest, my first ...

Read more
Have You Considered Adding SASE?
cybersecurity

Have You Considered Adding SASE?

Jul 17, 2022

Now that the new normal is work from anywhere, we've got a major limitation on our hands: network protection. We can solve some of this with DNS filtering, whic...

Read more
Handling NCE - Part 2
business

Handling NCE - Part 2

May 29, 2022

Back in January, I shared some ideas around how I'd personally approach NCE. To this day, it's one of my most popular posts. To that end, I thought I should ela...

Read more
How does your MSP's Team Identify?
business cybersecurity

How does your MSP's Team Identify?

May 11, 2022

As a trusted technology provider and business advisor, your MSP has some serious horsepower. It's why Matt and I are constantly talking about the importance of ...

Read more
Driving Better Employee Experience
digital-transformation modern-workplace

Driving Better Employee Experience

May 8, 2022

We live in a time where we can live a seamless technological life in our personal world. What do I mean? Should we choose to, we can tell our home goodnight and...

Read more
We Need a Federal Privacy Law
compliance cybersecurity

We Need a Federal Privacy Law

May 1, 2022

I was perusing one of my favorite cyber news spots, The Record, and stumbled on this article: Connecticut inches closer to becoming fifth state with data privac...

Read more
Stop Using Magic Links
cybersecurity

Stop Using Magic Links

Apr 4, 2022

Click here to get a link to login. Magic links are suddenly everywhere, and I simply refuse to accept the logic behind them. Before I rant a bit about why you s...

Read more
Will there be a cyber war?
cybersecurity

Will there be a cyber war?

Feb 28, 2022

As a cyber nerd, my first question when tensions went up in the region was 'what are the cyber implications?' The atrocities happening in Europe are shocking fo...

Read more
Text Messaging is Bad MFA
cybersecurity

Text Messaging is Bad MFA

Feb 11, 2022

Ahh texting. Arguably the start of the digital communications revolution. The good 'ol short message service (SMS). To this day, texting is a key method of comm...

Read more
How is your MSP's content game?
business msp

How is your MSP's content game?

Feb 10, 2022

The way people engage with brands has shifted monumentally in the last decade, even more so in the last 24-months. We engage with things on the internet, period...

Read more
MFA is a Compulsory Item
cybersecurity

MFA is a Compulsory Item

Feb 6, 2022

I might generate a bit of a stir, but this must be said! > You cannot be defensible if you are not meaningfully implementing multi-factor authentication. If I'm...

Read more
How I'd Approach NCE
business microsoft

How I'd Approach NCE

Jan 28, 2022

Microsoft's New Commerce Experience (NCE) comes with substantial changes to the way we're used to doing business with Microsoft. From price increases to extra p...

Read more
Review: FEITIAN Security Keys
cybersecurity product-reviews

Review: FEITIAN Security Keys

Jan 24, 2022

\[et\pb\section fb\built="1" admin\label="section" \builder\version="3.22" global\colors\info="{}"\]\[et\pb\row admin\label="row" \builder\version="3.25" backgr...

Read more
How I Secure WordPress
cybersecurity

How I Secure WordPress

Jan 16, 2022

\[et\pb\section fb\built="1" admin\label="section" \builder\version="3.22" global\colors\info="{}"\]\[et\pb\row admin\label="row" \builder\version="3.25" backgr...

Read more