Posts by K.K. Tucker
Microsoft Will Raise Prices for Nonprofits and End On-Prem Grants
In March, Microsoft made a number of changes to its licensing and pricing for Office 365 and Microsoft 365 business subscriptions. Now, effective September 1, 2022, Microsoft will raise prices for nonprofits as well, as the company recently announced. Here’s a breakdown of the price increases, the reasoning behind them, and why they’re being raised…
Read More3 Surprising Ways Technology Can Help Animals
If you’re like many of us here at Infused Innovations, you love both technology and animals. Are they usually discussed together? No. But there are some really cool innovative tools can be used to benefit animal welfare. Technology can help animals in a number of ways: the possibilities developing today are offering new insights and…
Read MoreMicrosoft Defender for Cloud: the Only Offering that Natively Supports Azure, AWS, and Google Cloud
The three largest cloud infrastructure providers are Amazon Web Services (AWS), Microsoft Azure, and Google Cloud (in that order, according to market share). They each offer an array of capabilities and conveniences—on top of data storage, customers can use them to build applications, run projects, track analytics, and more. Many customers, especially enterprises, have aspects…
Read MoreWhat’s all the Hype About NFTs?
You’ve probably heard about NFTs becoming one of the next big things in the digital world. Non-fungible tokens, as the full name goes, are a way to attach scarcity to digital items—thus creating value. This allows for them to be bought, collected, traded, invested in and so forth. But since they’re also non-tangible, this concept…
Read MoreAzure Firewall Basic Geared Towards Small and Medium Sized Businesses
Firewalls have long been a first line of defense for network security. The barrier that they create between internal and external networks acts as a sort of living fortress wall, monitoring the traffic and deciding what to let in. A firewall can take the form of hardware or software—and in the case of Azure Firewall,…
Read MoreMicrosoft Defender for Endpoint and Intel TDT Combine for a New Ransomware Defense
Ransomware continues to be a growing and evolving threat. As some cyber attackers become increasingly sophisticated, things like ransomware kits allow even hackers with a low level of skill to take part in this malicious activity. With relatively little investment, they end up reaping big gains. And once that happens, they have all the more…
Read MoreThe Role of Technology in Russia’s Invasion of Ukraine
During World War II, Ford Motor Company stopped its civilian automobile production and redirected its assembly lines toward military machinery instead. It was one way that a private company used its resources to aid government and country efforts. Decades later, today’s warfare involves more than physical machinery. Russia’s horrific attack on Ukraine is a culmination…
Read MoreWindows Hello for Business Cloud Trust is in Preview
Windows Hello for Business is an enterprise login tool that verifies identity with biometrics: facial recognition or fingerprints. This eliminates the need to enter passwords, which saves time & hassle and increases employees’ productivity. Last week, Microsoft announced its Windows Hello for Business cloud trust, which applies to hybrid environments. This new authentication model considerably…
Read MoreForrester’s Total Economic Impact™ Report for Microsoft Zero Trust Security Solutions
Two big aspects in work environments have changed considerably in recent years: huge amounts of workers have shifted to more remote or hybrid work, and cyber crimes have increased drastically in response to vulnerabilities related to this. Such a scenario makes it crucial for businesses to adopt a rigorous Zero Trust cybersecurity stance to protect…
Read MoreFacts and Misconceptions About Zero Trust
Cybercrime reports have gone up over 300% in the last couple years. And a surprisingly large number of breaches happen with company employees involved, often because of mistakes like falling for phishing baits. Any insider in the company can potentially be a point of vulnerability that can expose the whole network. That’s why a Zero…
Read More