Articles by Tad Yoke

Filter By Topic
Filter By Industry
Tad Yoke

Tad Yoke is a Solutions Architect and Senior Consultant for our Modern Workplace practice. He has over 20 years of experience assessing, designing and deploying technical solutions for Microsoft 365, Office 365, and Enterprise Mobility + Security (EMS); Azure directory and network management, Microsoft SharePoint and Microsoft SQL Server.

He is particularly passionate about developing Roadmaps, performing Security Assessments, and configuring Microsoft Teams Governance and Policy for our clients. Tad has numerous Microsoft certifications including his most recent accomplishment as a Microsoft Certified Security Customer Immersion Experience(CIE) facilitator. Follow Tad on Twitter.

A Look at Microsoft Defender Advanced Threat Protection’s Evaluation Lab

Learning to manage Microsoft Defender Advanced Threat Protection takes time, but the built-in evaluation lab can help expedite the process.

Onboarding With Microsoft Defender Advanced Threat Protection (MDATP)

Learn how to onboard computers with Microsoft Defender Advanced Threat Protection (MDATP), which goes beyond Microsoft Defender’s protection.

Cloud Security: A Holistic Approach to Solve General Issues

Have you thought of your approach to cloud security? Here are three quick ways to make sure your security stance is off to a good start.

A Handy, Step-By-Step Guide on Google Workspaces to Office 365 Migration

If you are leading a G Suite to Office 365 migration, you might be confused about the order of operations for configuration. We prepared a guide to help.

Asset Protection: Operations and Monitoring in Office 365

We highlight the importance of designating operational support and service monitoring guidelines for Office 365.

Asset Protection: Business Continuity and Disaster Recovery in Office 365

Considering a move to Office 365 or already there? This blog lists your options for business continuity and disaster recovery.

Asset Protection: Physical Architecture in Microsoft Office 365

Securing the physical infrastructure in Microsoft's data centers is as important as data availability. See your options in this post.

Asset Protection: Security Policies in Office 365

Let's review the Office 365 security policies that you need and why they're important. This is the latest in our series on asset protection.

Asset Protection: Identity Control in Office 365

Your company’s assets can no longer be secured using old methodologies for on-premises networks. You need a hybrid strategy.

Asset Protection: Legal Issues and eDiscovery in Office 365

Learn how the Office 365 Security and Compliance Center protects your data in the cloud and serves as a hub for legal needs.

Asset Protection: Encryption in Microsoft Office 365

Learn how data is protected in the cloud, specifically Office 365 and Azure, using the latest encryption technologies.

How to Protect Your Most Valuable Assets in Office 365 and Azure

In this blog series, we explain the tools available and how they work together to protect your assets in Microsoft Office 365 and Azure.