How to Use Conditional Access to Grant and Revoke Contractor Access in 60 Minutes

How to Use Conditional Access to Grant and Revoke Contractor Access in 60 Minutes

How to Use Conditional Access to Grant and Revoke Contractor Access in 60 MinutesNathan Colyer-Long
Published on: 12/01/2026

You need to grant access quickly so work can begin, but that often means sharing passwords or creating accounts that never get deleted.

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning
6 Ways to Prevent Leaking Private Data Through Public AI Tools

6 Ways to Prevent Leaking Private Data Through Public AI Tools

6 Ways to Prevent Leaking Private Data Through Public AI ToolsNathan Colyer-Long
Published on: 09/01/2026

They help us draft quick emails, write marketing copy, and even summarize complex reports in seconds.

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning
3 Simple Power Automate Workflows to Automatically Identify and Terminate Unused Cloud Resources

3 Simple Power Automate Workflows to Automatically Identify and Terminate Unused Cloud Resources

3 Simple Power Automate Workflows to Automatically Identify and Terminate Unused Cloud ResourcesNathan Colyer-Long
Published on: 05/01/2026

The problem is, these resources are often left running long after they’re needed.

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning
How to Implement Zero Trust for Your Office Guest Wi-Fi Network

How to Implement Zero Trust for Your Office Guest Wi-Fi Network

How to Implement Zero Trust for Your Office Guest Wi-Fi NetworkNathan Colyer-Long
Published on: 02/01/2026

But it’s also one of the riskiest points in your network.

BlogIT ManagementBusinessBusiness ContinuityIT SupportBusiness Planning