Blog Post by Oxen Tech
Oxen TechAug 27, 2020
Some Microsoft Teams users may receive unexpected Test notifications on mobile devices
If you have the Microsoft Teams app installed on a mobile device, you may have recently ...
Start Reading
Oxen TechAug 17, 2020
Endpoint Security: Today’s Cybersecurity Is Endpoint Protection
Nothing stays the same in technology, not even our traditional security tools. Case in ...
Start Reading
Oxen TechJul 29, 2020
IT Modernization vs. IT Migration
IT migration and IT modernization are not the same thing, and we have to treat them ...
Start Reading
Oxen TechJul 6, 2020
The Nitty-Gritty of Technology Lifecycle Management
Technology lifecycle management is a crucial part of any business’s strategy for healthy ...
Start Reading
Oxen TechJun 15, 2020
How Do Hardware-as-a-Service (HaaS) & Hardware Leasing Work?
Terms like “software-as-a-service”, “infrastructure-as-a-service”, and ...
Start Reading
Oxen TechJun 8, 2020
Types of Managed IT Services
We’ve talked before about what managed IT services is and how it can benefit ...
Start Reading
Oxen TechJun 1, 2020
New Features in Microsoft Teams for Remote Work and Collaboration
There are now a lot more features in Microsoft Teams to improve your video, chat, and ...
Start Reading
Oxen TechMay 4, 2020
What is a VPN and do you need one to work from home?
Since businesses started shifting to remote work due to COVID-19, OXEN has seen a ...
Start Reading
Oxen TechApr 20, 2020
Don't Forget Your Everyday Password Security
Website hacks and data breaches are constantly in the news these days. While the growing ...
Start Reading
Oxen TechApr 14, 2020
Some Office 365 subscriptions will be renamed to Microsoft 365
Microsoft has announced that Office 365 Pro Plus and Office 365 subscriptions for small ...
Start Reading
Oxen TechApr 13, 2020
Be Wary of Tech Support Scams
We need technical support companies to help us solve complex issues with our devices and ...
Start Reading
Oxen TechMar 30, 2020
Feeling the COVID-19 Panic? Don’t Forget Your Cybersecurity
Attackers Are Taking Advantage of Unprecedented Changes
Start Reading
