Author Archives

Michael Sampson

Rotten from the Core?

Along with many others, my late 2017 Apple MacBook Pro suffers from a problematic keyboard. While I have had the laptop since before Christmas last year, I haven’t used the keyboard very often, since it is usually connected to a large screen and external keyboard in the office. […]

Protecting Mobile Devices

Mobile devices as endpoints to corporate information have taken the world by storm. The “mobile first” mantra refers to the preferential use of a mobile device before a desktop or laptop. Have phone, will work (or even run the company). The potential of the device to enable new […]

Spoof Intelligence in Office 365

Microsoft added Spoof Intelligence for email security earlier this year (January 2018 I think). This was included as a feature of the Office 365 Enterprise E5 plan, as well as a feature of the Advanced Threat Protection add-on for non-E5 customers. Spoof Intelligence provides visibility into who is […]

Email Security

The prevalence of email (addresses, services, checking behaviours) has made it a key vector for hackers, attackers, and others devoted to maleficence. There are many varieties of bad email: – spam – unwanted email messages, normally carrying a commercial offer. Annoying and productivity draining at best; may carry […]

Excel for Mac Plus Excel MVPs

Excel Table Talk Episode 6 Back in the early 1990s, the first client project that paid decent money (NZ$25 per hour, which my client described as “charging like a bull”) required the use of a massive spreadsheet to analyse cost flows in a small manufacturing firm. I spent […]

Onboarding and Offboarding: The Hidden Processes

There’s a whole set of activities required for effectively onboarding and offboarding new employees. People to coordinate. Processes to develop and operate efficiently. Magic moments that should just happen – because first impressions count and create memories. One of the behind-the-scenes or hidden processes involves setting up access […]

Information Protection: The What

When thinking about information protection, one of the key questions is what: what specific information should be protected? Some information doesn’t need to be protected at all, such as when it is common knowledge (2+2=4) or easily available (the name of the current leader of a country). Other […]