Todd Hebebrand

Passwordless Authentication: A Seamless and Secure Evolution

Windows Hello for Business login interface on a PC, emphasizing biometric and PIN-based authentication

In the fast-paced digital world, OliveTech is at the forefront, championing passwordless authentication. This cutting-edge method not only boosts security but also simplifies user access. What Passwordless Authentication Entails Why Choose Passwordless? Supportive Statistics Diverse Passwordless Solutions Implementing Passwordless Sign-In Starting with passwordless authentication is straightforward, particularly with applications like Microsoft Authenticator. Steps for Microsoft … Read more

CIS Controls v8 Intro

CIS Controls are a set of actionable security best practices that offer comprehensive protection against prevalent cyber threats. Organized into Implementation Groups (IGs), these controls provide a structured approach to cybersecurity. IG1 lays the foundation with essential security measures suitable for all organizations, aiming to mitigate the most common cyber risks. IG2 expands upon this … Read more

Why Choose a Denver Area MSP for Your IT Needs?

Salt Lake City Profile

Introduction to Denver’s Tech Landscape Denver, Colorado, a city known for its vibrant tech scene and dynamic business environment, demands robust and innovative IT solutions. As businesses in Denver continue to grow and evolve, the need for a reliable Managed Services Provider (MSP) becomes increasingly crucial. In this context, Denver-based MSPs, like OliveTech, offer a … Read more

Using Encryption Wisely: Ensuring Access While Securing Your Data

A Guide to Balancing Security and Accessibility When small businesses adopt encryption, it’s like installing a high-tech security system. However, just as you wouldn’t want to lock yourself out of your office, you need to use encryption wisely to avoid losing access to your own data. Here are our Smart Encryption Practices: 1. Understand Your … Read more

Cybersecurity Made Easy: A Business Owner’s Guide to Implementing CIS Controls v8

Lock and Shield

Safeguarding Your Business in the Digital Age In our digital era, where business and technology are deeply intertwined, cybersecurity is not just a technical requirement; it’s an essential part of running a successful business. For non-technical business owners, understanding and effectively implementing cybersecurity can be daunting. CIS Controls v8 offers a structured and accessible framework … Read more

Empowering Your Communication: SMS Texting Options for Microsoft Teams

Communication is the backbone of any successful business. As a leading Managed IT Services Company, OliveTech is always at the forefront of offering cutting-edge solutions for businesses in Northern Colorado. One tool that has proven essential for seamless communication in today’s fast-paced business environment is Microsoft Teams.OliveTech has been doing Teams migrations for phones, chat, … Read more

What is a Modern Workplace? Unlocking Business Success with Microsoft Solutions

Generative AI Corner of modern Industrial style open space office with white walls, concrete floor, rows of computer tables and panoramic windows with blurry cityscape. 3d rendering

In today’s fast-paced and ever-evolving landscape, the traditional office space is transforming into something more agile, flexible, and technology-driven—a Modern Workplace. With the advent of Microsoft’s Modern Workplace solutions, OliveTech is committed to helping you navigate this shift effortlessly, enabling you to unleash productivity like never before. The Definition of a Modern Workplace by Microsoft … Read more

Maximize Your Business’s Potential with Microsoft 365 Business Premium’s Email Capabilities

eMail locked

Introduction to Microsoft 365 Business Premium’s Email Encryption Microsoft 365 Business Premium indeed includes robust email encryption, featuring Office 365 Message Encryption (OME). This tool enables you to send encrypted email messages to any recipient, regardless of whether they’re within or outside your organization. With encryption, only authorized recipients can decipher and read your emails, … Read more