It is the first of July 2022 and, just like a year ago, it is with great pleasure that I can write that I have been awarded another year as a Microsoft MVP. I feel immensely honoured by the trust …
Today is the first of July and I am extremely pleased to have received an email from Microsoft on this special day. Those who are familiar with the Microsoft MVP Award or are Microsoft MVPs themselves know on this day …
Strong passwords are an important basis for protecting your data. Unfortunately, many users still use the same passwords for all profiles or use simple combinations such as Welcome123 or their name. But how do you make a password really secure …
Who is this book for? Surviving IT is written for any tech industry professional who feels stuck, is struggling in their career, or starting to feel that they just aren’t suited to work in the tech industry. If you’re looking …
Since 22 October 2009 I am now a Xing Member. However, I did not have the Premium Subscription for a long time. At the beginning Xing was very innovative and the perfect platform to network and make new contacts. Xing …
Today is the first of July. This is a very special day for every Microsoft MVP. On this day the new fiscal year at Microsoft begins and this also means that the new MVP cycle starts. On this day (or …
Prolog There are several ways to create a Certificate request (CSR) for SSL Certificates. There are a large number of tools that can help or assist you in this process. Personally, I like to use PowerShell for this. There is …
In this article I have decided not to write a technical contribution. Here you can see a video of me thanking you for all your support in 2019. I look back a little bit what happened last year and also …
I am proud to announce that I was awarded today by Microsoft, with the Microsoft Most Valuable Professional (MVP) Award for 2019–2020 for Office Apps & Services. Thank You! I want to give a special shout-out to everyone who …
The last part of my trilogy is about the weakest link, our employees. Some of the things you will read in this article, you already know from one of the previous two articles. When I write that our employees are …
In the first part of my small trilogy we have learned about the risks, which are waiting over the Emails. In this article we will have a closer look about most common types of attacks against a company in general. …
Company e-mails have to follow some policies before they can be sent out from an organization. If these policies are strict or not depends on the business field. To get an example from a customer company I am working with: …