Learn With Afidence
Insights and wisdom from our community
All
- All
- Afidence Updates
- Business Technology Services
- Cybersecurity
- IT Trends with IT People
- Software Development
- Taste of IT Conference
Vulnerability vs Penetration Testing: Their Key Differences
Cybercriminals and hackers can find ways into your systems, networks, applications and more with just a little bit of work....
Power Up With Power Apps: Use Cases and Tips
Not every solution needs to be a heavily coded project. Microsoft’s Power Apps offers a “low code” solution within the...
IT Trends With IT People: Leadership and Innovation with Ryan Hale, CIO of Lithko Contracting
https://www.youtube.com/watch?v=wuPLQQN4UtY What does it take to lead IT for a billion-dollar construction powerhouse? For Ryan Hale, it’s not about being...
Essential SharePoint Security Tips for Your Site
If your organization uses Microsoft’s SharePoint, setting up a strong security model is essential. When you keep your SharePoint secure,...
Building an IT Roadmap: A Strategic Guide for Growth
It is virtually impossible to work today without using any technology. Therefore it’s essential to have a well-planned, strategic approach...
SharePoint Use Cases: Real-World Examples of How to Utilize SharePoint
There is much more to SharePoint than you might think. With so many different uses and the fact that SharePoint...
Microsoft 365 Features You Should Be Using, But Aren’t
There’s more to Microsoft 365 (M365) than just Teams, Word, Excel and PowerPoint. Among the many tools available to help...