Join me on my journey as I share my insights and experiences on web development, business, and content creation.
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD For Android using Microsoft Intune Alright, so today we’re going to be talking about the management of bring your own device BYOD for Android devices. There’s a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen...
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be...
Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune Strengthening Your BYOD Program with Secure Email Policies In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by...
How I Passed the CISSP Exam After 9 Months of Study Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here’s how I did it, the resources I used, and some tips to help you on your journey. My Study Plan 1. Set a Realistic Timeline From the outset,...