Latest Articles

business articles video

Are you starting a consulting business in 2025? What you need to know.

Starting a Consulting Company in 2025: What You Need to Know As more professionals leave the security of full-time employment to pursue consulting, the idea of starting your own business becomes both inspiring and daunting. While the freedom to shape your career and work on your own terms is alluring, it’s critical to understand that building a successful consulting business involves significant planning, preparation, and risk. This blog post explores the realities of starting a consulting company in 2025, offering practical advice and insights into the careful groundwork required to...

cybersecurity tips jamf tutorials

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea...

cybersecurity tips microsoft

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 Strengthening Your BYOD Program with Secure Email Policies In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block...

scripts jamf tutorials

A few helpful JAMF extension attributes for Computers

A few helpful JAMF extension attributes for Computers As I continue to build out my JAMF Github Repo it was no surprise that JAMF Extensions are one of the key and fundamental elements and features that gives JAMF that edge as an MDM. Scoping is a key part of what makes an MDM so powerful and the ability to group, report and then scope to specific custom values is what sets it apart. In that vein, I have put together some of my computer JAMF extensions that I use and...

scripts jamf tutorials

Some of my favorite iOS and macOS App Configurations in JAMF

About App Configs and Managed Preferences As I work on building out my JAMF Github Repo I am constantly looking at sharing some of the configurations that have worked for me and saved me time and effort. Many of these came from the JAMF Library, but some I wrote specifically due to tools and workflows that I had to tackle in my very own ecosystem. The following iOS App Configs were helpful in automating the configuration of key iOS apps. Some of these were a direct result of the AppConfig...

reviews video

Mactracker Walkthrough and Review

Introduction In the world of Mac administration, having the right tools at your disposal is crucial. One of the standout applications that every Mac admin should consider is Mac Tracker. This powerful app serves as a comprehensive database of all historical Mac OS versions and Apple accessories, making it an invaluable resource for both seasoned professionals and newcomers alike. In this article, we will explore the features of Mac Tracker, how it can enhance your workflow, and why it deserves a spot in your toolkit. Key Features of Mac Tracker...