We hear it over and over again, how Linux is more secure—yada..yada..yada…. While that can be true its only true if the computer environment is configured properly. Security is done in layers, and often layers that seem troublesome are removed,...
SELinux: Why it's time to stop turning it off
Enhance Productivity through Core Values
Like many companies today, iuvo Technologies has a set of core values. Our core values are: Trust, Respect, Humility, Take Initiative, Embrace Change, Experience Matters, Collaboration, Open Communication, and Relationships Are Key. Fortunately, a...
Protecting Your Data with Microsoft Sensitivity Labels
Table of Contents: 1. Microsoft Labels and Information Protection2. Sensitivity Labels Overview3. Using MCAS to apply Microsoft Sensitivity Labels4. Configuration5. Integration with Microsoft Copilot6. Licensing Requirements7. Management 8....
Three Tips for Successfully Navigating the Great Resignation
The Great Resignation hit the workforce hard, especially in fields that experienced extreme increases in demand because of COVID-19, accordingto Harvard Business Review. Many organizations had to halt or delay projects, focusing their energy on...
How to Move Files in Microsoft Sharepoint Using Power Automate
How To Calculate UNIX File Permissions
Introduction
Unix file permissions can seem a bit daunting to everyone. This guide will help to have a solid grasp on setting the correct permissions for all UNIX file systems. Covering both Linux and Mac distributions.
Business Empowerment: Where Information Technology Intersects Growth
When individuals contemplate IT they typically reflect on the ways in which they have been exposed and impacted by IT services. Often services like setting up computers and fixing printers come to mind. These services frequently equate to “IT help”...
SSSD Linux Active Directory Authentication: Joining a Domain Without VPN
We have a few earlier blog posts on setting up Linux based Samba file shares with Active Directory authentication.Similarly, there are many documents on the Internet on configuring LDAP authentication to Active Directory.However, very little has...
Azure AD Authentication to Azure VM
Many organizations are adopting a cloud only approach to infrastructure. Why wouldn’t they? It’s scalable with predictable costs, and it can be accessed from virtually anywhere. However, authenticating with services and virtual machines on the cloud...
-1.png?width=350&height=117&name=iuvo_logo_blue_Transparent%20(1)-1.png)