Shared Links (weekly) June 1, 2025
For more like this, subscribe to the newsletter and get these links and more in your email.
M365 Links:
Be sure to subscribe to my M365 Newsletter for more M365 expertise and news.
Follow these topics: Weekly Links
For more like this, subscribe to the newsletter and get these links and more in your email.
M365 Links:
Be sure to subscribe to my M365 Newsletter for more M365 expertise and news.
Follow these topics: Weekly Links
That’s what Michelle Golden suggested last week, and I tend to agree. I see this most plainly trying to document the time I spend in the office. I’m an hourly employee, technically I’m supposed to do work in the office, and then stop. Except, in the era of constant connectivity, how am I really supposed…
At first blush, the idea of scanning images synced up to iCloud for child sexual abuse materials against the hash list of known CSAM images seems like a good idea. As a survivor of childhood sexual abuse myself, I want tech companies to takes some initiative to deal with this issue. They also want to scan images on kids’ phones using AI to see if kids are getting into any trouble with sending or receiving sexual material. Again, that sounds like a good thing. But, as the EFF points out, this all requires a backdoor, and backdoors, once created, almost never remain used for just one purpose.
Desktop Users! One Out of Five of You is Running on An Insecure, Unsupported Operating System
Convenience and Catastrophes of Self-Collection
eDiscovery Productions in Business Productivity Suites: Truly End-to-End?
How to talk about mental health at work during pandemic and election
How to Identify a Phishing Attempt and Thwart It
Use the Brave Browser for Privacy Concerns
Getting on the Same Page…of the Dictionary
After 15 Years, Has the eDiscovery EDRM Model Been Realized
Time to Treat Broadband Like the Essential Service It Is
The secret struggles of introverts in a remote workforce
Dear Leaders, Are You Really Taking Care Of Your Working Parents In The Pandemic?
Many Americans Plan To Move, Now That They Can Work From Anywhere
Most organizations had an unknown or unmanaged internet-facing asset exploited
The Most Important eDiscovery Phase is the One That Drives All the Other Phases
Embedding social media posts can be considered copyright infringement…but is it?
5 Reasons Why Networking Training Is the Antidote to The Great Resignation
Hey, look, Microsoft isn’t just putting Copilot everywhere and forcing personal users to opt in and pay more for it; they’re also turning off features that Copilot can perform instead for anyone who opts out, like Smart Lookup.Â
This is all part of the “Copilot everywhere” strategy that we are all part of, whether we want it or not
This post is full of bad news like this: Radware released its 2018 Executive Application and Network Security Report. For the first time in the survey’s five-year history, a majority of executives (53%) reported paying a hacker’s ransom following a cyber attack. Ouch. Like most hacking/scam/spam tools, they are usually popular because they work. Ransomware…