Welcome to my blog

Join me on my journey as I share my insights and experiences on web development, business, and content creation.

Latest Articles

cybersecurity tips jamf tutorials

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the companies sensitive data in all forms. You need to ensure its integrity, confidentiality and availability. Yes, the triad. You will see this come up again and again as a common theme. Securing...

cybersecurity tips microsoft

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

Strengthening Your BYOD Program with Secure Email Policies In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by default and ensure only sanctioned apps can access organizational email accounts. Here’s how we’re tackling this challenge using Microsoft Exchange Online’s robust security features and policies. Why Secure Email Access is Essential Email remains...

scripts jamf tutorials

A few helpful JAMF extension attributes for Computers

A few helpful JAMF extension attributes for Computers As I continue to build out my JAMF Github Repo it was no surprise that JAMF Extensions are one of the key and fundamental elements and features that gives JAMF that edge as an MDM. Scoping is a key part of what makes an MDM so powerful and the ability to group, report and then scope to specific custom values is what sets it apart. In that vein, I have put together some of my computer JAMF extensions that I use and...

scripts jamf tutorials

Some of my favorite iOS and macOS App Configurations in JAMF

About App Configs and Managed Preferences As I work on building out my JAMF Github Repo I am constantly looking at sharing some of the configurations that have worked for me and saved me time and effort. Many of these came from the JAMF Library, but some I wrote specifically due to tools and workflows that I had to tackle in my very own ecosystem. The following iOS App Configs were helpful in automating the configuration of key iOS apps. Some of these were a direct result of the AppConfig...

reviews video

Mactracker Walkthrough and Review

Introduction In the world of Mac administration, having the right tools at your disposal is crucial. One of the standout applications that every Mac admin should consider is Mac Tracker. This powerful app serves as a comprehensive database of all historical Mac OS versions and Apple accessories, making it an invaluable resource for both seasoned professionals and newcomers alike. In this article, we will explore the features of Mac Tracker, how it can enhance your workflow, and why it deserves a spot in your toolkit. Key Features of Mac Tracker...

cybersecurity tips

How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies

How I Passed the CISSP Exam After 9 Months of Study Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here’s how I did it, the resources I used, and some tips to help you on your journey. My Study Plan 1. Set a Realistic Timeline From the outset,...

Prev 1 ... Next

Subscribe to my newsletter

Join me on my journey as I set out to help aspiring entrepreneurs take that critical first step.