Latest Articles

cybersecurity tips tutorials

Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD For Android using Microsoft Intune Alright, so today we’re going to be talking about the management of bring your own device BYOD for Android devices. There’s a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM...

reviews video

Amphetamine: The Ultimate Mac Utility to Keep Your Computer Awake

Introduction In today’s fast-paced digital world, keeping your computer awake during important tasks is crucial. Enter Amphetamine, a powerful utility designed specifically for Mac users. This app ensures that your system remains active, preventing it from going to sleep or activating the screensaver when you need it most. In this article, we will explore the features of Amphetamine, how to use it effectively, and why it’s a must-have for Mac admins and everyday users alike. What is Amphetamine? Amphetamine is a versatile application available on the Mac App Store that...

business articles video

Are you starting a consulting business in 2025? What you need to know.

Starting a Consulting Company in 2025: What You Need to Know As more professionals leave the security of full-time employment to pursue consulting, the idea of starting your own business becomes both inspiring and daunting. While the freedom to shape your career and work on your own terms is alluring, it’s critical to understand that building a successful consulting business involves significant planning, preparation, and risk. This blog post explores the realities of starting a consulting company in 2025, offering practical advice and insights into the careful groundwork required to...

cybersecurity tips jamf tutorials

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea...

cybersecurity tips microsoft

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

Blog Series Securing BYOD Email Access: Exploring Strategies in Microsoft 365 BYO with me in 2025: iOS with User Enrollment in JAMF Pro Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune BYOD Restrictions & Strategies for 2025 Strengthening Your BYOD Program with Secure Email Policies In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block...

scripts jamf tutorials

A few helpful JAMF extension attributes for Computers

A few helpful JAMF extension attributes for Computers As I continue to build out my JAMF Github Repo it was no surprise that JAMF Extensions are one of the key and fundamental elements and features that gives JAMF that edge as an MDM. Scoping is a key part of what makes an MDM so powerful and the ability to group, report and then scope to specific custom values is what sets it apart. In that vein, I have put together some of my computer JAMF extensions that I use and...