Core Blog

Discover Important Insights

Latest Posts

cybersecurity myth ransom
Security

Cybersecurity Myth Busted: We’ll Just Pay the Ransom

Paying the ransom will not immediately stop the attack and restore your systems. You still have to remove the initial attack vectors and infections.
january 2022 teams updates
Productivity & Collaboration

9 New Updates to Microsoft Teams | January 2022

This month is stacked with Teams enhancements to ensure a better user experience when organizing and participating in meetings. Here's how they benefit you.
cybersecurity blog target
Security

Cybersecurity Myth Busted: We’re Not a Target

Since every organization has something valuable it must protect, the reality is that every organization is a potential target for extortion-related attacks.
overcome resistance to change
Productivity & Collaboration

How Business Leaders Can Overcome Resistance to Change

Here's how leaders can understand their change cycle, find their organization’s sweet spot for change, and how to move employees them from fear to excitement.
microsoft teams updates feature
Productivity & Collaboration

10 New Updates to Microsoft Teams | December 2021

December is stacked with Microsoft Teams Meeting enhancements to ensure a better user experience. Here's how the new updates benefit your day-to-day work.
m365 licenses feature
Productivity & Collaboration

How to Get the Most Out of Your M365 Licenses

If you have an M365 license, you should evaluate any tool you use to see if you can replace it with features and tools you already have with Microsoft 365.

Featured Articles

Developer typing code on laptop
Productivity & Collaboration

Async, Await, and ConfigureAwait – Oh My!

In .NET Framework 4.5, async/await keywords were added to make async programming easier to work with. However, there are a few gotchas you may not know about.
Power BI reports on tablet
Data Analytics

How Aggregation Tables Improve Performance for Power BI Reports

This dive into aggregation tables will help you decide when to use them in Power BI to improve your data model and query performance.
Power BI report features
Data Analytics

Power BI’s Latest Features and How to Use Them

In this regularly updated blog, we highlight key features from our monthly Power BI Office Hours so you know how to capitalize on Power BI’s latest features.
Managing Team Capacity
Productivity & Collaboration

What is a SharePoint Administrator?

The role of a SharePoint Administrator will vary depending upon your organization. Here's an overview of the job's responsibilities, limitations, and more.

Security Insights

We put security at the core of everything we do

Cybersecurity Myth Busted: We’ll Just Pay the Ransom

Paying the ransom will not immediately stop the attack and restore your systems. You still have to remove the initial attack vectors and infections.

Cybersecurity Myth Busted: We’re Not a Target

Since every organization has something valuable it must protect, the reality is that every organization is a potential target for extortion-related attacks.

The 6 Major Stages of a Successful Cloud Migration: A Walkthrough

By following these proven major stages of a successful cloud migration, IT leaders can provide a path to a more flexible, responsive, and agile organization.

Connect Teams Users to PureCloud Help Desk Agents with Azure Bots

We recently helped one of our clients to create an experience where both end users and Help Desk Agents can remain in the tools where they are most productive.

Cloud Insights

Gain competitive advantage with Azure

View All Blog Posts

datacenter evpn blog feature
Networking

Time to Reconsider MP-BGP EVPN for Your Datacenter Network?

Most datacenter architects discounted using a native VxLAN design because of multiple challenges and limitations. But here's why it might be time to reconsider.
Read More
security staff blog
Security

Part-Time Staff Cannot Monitor and Manage Your Security

Security isn't 9-5. You have concerns, risks, and attacks 24/7/365. Adversaries work around the clock. Therefore, your security also needs constant attention.
Read More
Cybersecurity Myth Busted
Security

Cybersecurity Myth Busted: Security Can Be Managed by IT

IT focuses on building and running systems to enable business. But Security asks if the systems are secure, if they can break them, and how they can be misused.
Read More
Remote worker on video call
Security

The Disappearing Edge Requires SASE to Protect Remote Workforces

2020 made IT pros do a lot of unnatural things to keep businesses going. Now it’s critical to consider architectures like SASE to protect our remote workforces.
Read More
Microsoft 365 Tips
Cloud Deployment & Optimization

3 Key Foundations to Ensure Long-Term Success with Microsoft 365

Regardless of the workload that's being enabled, “lit-up”, or adopted, these basic foundational items need to be addressed to set up M365 for long-term success.
Read More
Core BTS Website
Managed Services

New Site Showcases Our Growth Into a Full-Service IT Consultancy

As business challenges have evolved, so has Core BTS. Our CEO, Paul Lidsky, shares how our new site showcases our brand and ability to drive value for clients.
Read More

Subscribe to our Newsletter

Stay informed on the latest technology news and trends

X