Blog

In today's contribution, I would like to focus on data visualization within our ATOM ONE service. Data, information and security are a trend of modern times, and with the arrival of digitization, it is necessary to deal with the data flow, especially with regard to security. For this reason, in my o...  Continue reading...

Security in Exchange Online
 
 Jan Čížek

Exchange Online, as part of the entire Microsoft 365 ecosystem, offers many security solutions even in basic licensing plans. Customers are offered scaled computing power and the strength of Microsoft's best security teams, which have an enormous amount of information about attacks worldwide. Variou...  Continue reading...

Operation restrictions always come at the worst time. Murphy's Law fully prevails in IT. We can expect an onslaught of user requirements whenever it is before vacations, or prior to the completion of an important - and often strategic – task. These are all, in my opinion, things that do not only hap...  Continue reading...

"When should I start managing my Azure environment systematically?" This question is likely to be asked by many IT executives responsible for cloud services in their organization. If your organization is just starting out with Azure, it's best to begin right away than later or never at all. If your...  Continue reading...

We created ATOM ONE to help organizations prevent attacks on their environment and, where appropriate, to help reduce the impact of such an incident. Nowadays, there are many products and services on the market focused on security of a specific area. These are state-of-the-art technologies and by...  Continue reading...

Is health check of online services worth it? Yes, it is. And yes, twice more. The principle of the so-called shared responsibility during the operation and use of online services in the cloud is still unnoticed by many users. What to imagine in the case of such a check? Is this an audit? Certifica...  Continue reading...

On 24 June 2020, the results of the Microsoft Awards 2019 competition were announced. This year's main theme was Digital Transformation, as a process representing a completely new way of connecting people, processes, and data. We are proud to announce that KPCS CZ received the award of a Finalist in...  Continue reading...

Are marketing colleagues wondering how to surely get your business on the front pages of newspapers? We have a guaranteed tip for you, how you can help from the ICT department. Get infected with ransomware and don't try to keep it a secret. Ransomware. A reliable way to the front page. You would...  Continue reading...

I use Microsoft Teams for work daily. During the time I have been using Teams, I have come across many interesting features and tips on how Teams makes my work easier. I'll try to share my tips, I'm sure you use some of them, but I hope you'll come across something you haven't known before. Mentio...  Continue reading...

The concept of zero trust has been here for a long time. Is it possible to trust it? When, according to it, nothing can be trusted? Yes. Because we can verify it with practice. Imagine a situation. All users, applications, end devices, and data are somewhere on the Internet. Users do not sit at t...  Continue reading...

Support of Windows 7 terminated this year on 14 January after more than 10 years. Therefore, technical support and software updates from Windows Update are no longer available for this product to help protect your computer. Windows 7 is despite its age (released in 2009) still popular and was not pu...  Continue reading...

ExRCA in a new guise The announcement of the transition to Microsoft Fluent UI at the Microsoft Ignice conference last year is bearing fruit. In April, a new interface was added to the web tools of the Remote Connection Analyzer (RCA). These tools allow you to verify functionality from the ind...  Continue reading...

Remote cooperation and applications related thereto are becoming more and more searched for, not only by users but also by attackers trying to find new bugs and vulnerabilities in these products. Unfortunately, Microsoft Teams was no exception, and together with Zoom and others faced vulnerabilities...  Continue reading...

Nowadays, when it is possible to find a large number of tools and instructions on the open Internet on how to break the security restrictions of a computer and thus take control of it or obtain the credentials of another account, almost anyone can become a hacker. One of such very common utilities i...  Continue reading...