Author Page

About Red Level

As a comprehensive technology services company, Red Level delivers customized scalable technology solutions designed precisely to our client's unique needs – solutions that accelerate growth, reduce costs and enable collaboration. As a preferred partner to technology leaders such as Microsoft, DellEMC, and VMWare, we deploy the most advanced business technology solutions, ensuring optimal reliability, productivity and value.

Curia Announces Master Timeline To Exhibition Planning and Management System

Curia has announced the addition of a "master timeline" feature to the exhibition planning and management system, marking a major enhancement to the system's capabilities. Designed for use by museums in planning, staging, and managing exhibits, Curia provides users with a centralized cloud-based tool enabling stakeholders at various levels of the museum hierarchy to collaborate effectively together within a single system. The tool effectively replaces the usual cumbersome array of tools and applications museums use for this purpose, streamlining workflows and establishing a single secure "source of truth" for tools, information, and materials related to exhibits.   Developed in cooperation with the Perez Art Museum Miami as a response to requests from about 40 clients and prospects, the master timeline function is a major enhancement to Curia's capabilities. Curia's goal has always been to make the creation, execution and follow up of an exhibition much more efficient, and we've been ...

2023-02-16T16:01:29+00:00

The 7 Secrets to Project Management Success

The digital revolution is already underway. Both individuals and organizations must adopt new habits, modes of thinking and ways of living if they want to thrive in an increasingly technology-driven world. Whether you’re automating existing processes or designing cutting-edge digital-first strategies, implementing new technologies can make your business more agile, competitive, productive, and ultimately, successful. But implementing new technologies also has the potential to be disruptive. To reduce this friction, you need to have a carefully designed project management plan in place. Whether you’re ensuring workstation compatibility in the wake of a merger, carrying out a routine hardware upgrade, or performing an enterprise-level cloud migration, follow these pro tips to ensure that your project runs as smoothly as possible. 1. Be proactive, not reactive As a project manager, one of your most important professional responsibilities is to ensure that team members stay on track, on task, and on budget. For ...

2023-02-16T16:01:30+00:00

Top 5 Software Development Trends in 2019

In the world of software development, you’ve likely heard a lot of fancy terms; machine learning, Artificial Intelligence, Internet of Things, Virtual Reality, the list goes on and on. But how many of those have been proven to last and will remain impactful to us in 2019? Let’s take a look what’s here to stay in 2019 and how they may affect you. 1. Big Data is Just Data Now Big data was a hot topic a while back. But, it’s no longer, “hey, big data is coming.” The notion now is “bigger data is here.” What used to be constrained as too much data to process is all possible now thanks to cloud providers. Data is now decentralized from the local server and in the cloud, which provides a better disaster recovery plan and greater computing power for processing the data. From a business perspective, data has become a ...

2023-02-16T16:01:30+00:00

Top 5 User Experience Design Trends in 2019

If you need to explain a joke, it’s not funny. User experience shares the same construct - a good user experience requires no explanation.  As we march into 2019, let’s take a look at the up and coming trends to enhance user experience design. See what you can expect or how your business can benefit by creating a seamless user experience. Internet of Things (IoT)If you are not familiar with this terminology, IoT describes the way that devices are interconnected with each other via the Internet. They capture information for you and provide information to you at the same time. A very common example is Face ID on mobile phones, which uses biometric features and facial recognition to unlock your mobile device. Smart home components have been catching up as well, such as your home monitoring and home automation.  A common example is the smart thermostats - we are now able to ...

2023-02-16T16:01:31+00:00

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the recipient into installing malware on their computer or network. Here is how it works:  1. You receive an email with an attachment from what looks like it originated from a ...

2023-02-16T16:01:31+00:00

Digital Transformation and What it Really Means for Business

It's impossible to pick up a business magazine or read an IT blog without seeing "Digital Transformation" in the headlines. And while it's garnering a lot of ink and pixels, many professionals aren't quite sure what this means for their business. When we need technology answers, we go right to Mike Balatzis. He's Red Level's Microsoft Solutions Manager and besides being a nice guy with a big brain, he talks in plain English so even the non-geeks can understand. We peppered him with a few questions about Digital Transformation and what it really means for business owners and executives. Here's the scoop. What is the Digital Transformation? In simple terms, every business is a Digital Business and the importance of technology as a driver for business value has never been greater. This is especially important when there is an outage or another business impact. Everyone wants the ability to connect ...

2023-02-16T16:01:32+00:00

Meet the Team: Q&A with Red Level Helpdesk Manager Hayley Sargent​

By day, Hayley Sargent leads Red Level's Helpdesk team as they wrangle technical issues and support the IT needs Detroit area business. On nights and weekends, you'll find her wrangling a different animal. The Office 365 and Azure expert trades her Microsoft Surface Pro and headset for a saddle and hat as she trains horses. We sat down with Hayley for a quick Q&A on What’s your favorite restaurant? Believe it or not, Texas Roadhouse! What's your favorite pastime outside of work? If I had to pick just one, I’d have to say training and riding horses. If I’m allowed two, don’t forget a love of video games! Why did you choose to work in IT? I enjoy the consistent challenge to my abilities. It’s one of the few fields that was so fast-paced and dynamic enough to provide me with a new puzzle to solve every day. What's your ...

2023-02-16T16:01:33+00:00

Azure Information Protection

How do you ensure your organization's confidential documents are accessible by approved eyes only? Fear not. Azure Active Information Protection can be your trusted friend to ensure that the sensitive data is well protected when appropriate groups or policies are set up and implemented. Specifically, Azure Information Protection, which is data loss prevention (DLP) for documents can be utilized to secure your confidential data. This blog provides a high-level overview of the DLP solution for Microsoft Azure. There are some different ways to start leveraging the platform and protecting your sensitive documents. Labels Place appropriate labels on your documents - you can have these labels applied by the users as they're editing documents Using client application and plugins into the office applications to apply labels when editing documents Customize your labels to control access to the documents by department or personnel. Create visual marking on the documents, such as header, ...

2023-02-16T16:01:33+00:00

Azure Active Directory Identity Management

Microsoft Office 365 is widely used in many organizations. If you are an administrator for your Office 365, you are likely to be familiar with the Admin Center to look at user accounts and monitor activities. But do you know all the account activities were pulled in from Azure Active Directory in the cloud and are only displayed in the admin center?  If you've got Dynamics, Exchange, SharePoint, or any of the Microsoft software that is in the Cloud, it's going to be using Azure Active Directory as its Identity Manager in the back end. There are a couple different approaches to manage identity in Azure Active Directory. Identity Sharing- As an admin, you may be familiar with creating Active Directory trust to different organizations, so you can authenticate across organizations or different servers across organizations. However, you don't have that ability with Azure Active Directory. In Azure AD, it's called ...

2023-02-16T16:01:34+00:00

Multi-Factor Authentication Conditional Access Configuration

Multi-Factor Authentication Conditional Access and Policies Configuration Multi-factor authentication (MFA) creates an extra step to verify user identity who wants to gain access to your server or database. MFA provides greater security with that layered authentication approach. When hosting MFA on-premises, you can lock down the server or cloud applications that are tied in with Microsoft ADFS (Active Directory Federation Services) in the environment that you have deployed. In this blog, we will be discussing a couple of different ways to manage the cloud version MFA, including setting up conditional access for your MFA. MFA Management Console Go to your Groups and select MFA authentication You should see a list of your users with an indication if they have already enabled MFA Enable MFA for your administrators or selected users By enabling MFA, your users or admins will be prompted to set up their second form of authentication device when ...

2023-02-16T16:01:34+00:00