clear glass bottles on brown wooden table


The problem with OAuth apps is that they don’t ever fully uninstall themselves. The permissions are left there forever, even after you close the account, just waiting for a hacker to figure out how to exploit. In this blog I’ll show you what permissions are granted and how to remove them for M365 and Google users.

people standing inside city building

Embracing Change and Growth in your MSP

Opening an MSP is easy. Building an MSP is hard. Establishing a grow pattern is harder. Building culture is the hardest part of running an MSP. I’ve shared a lot of the wisdom I’ve gathered over the years. It can summarized as follows: This summary reflects the overarching principles for […]

two women sitting at a table looking at a computer screen

Amy’s sayings: The answer is always Yes

Do not confuse this phrase with the customer is always right or that you have to ask how high when they ask you to jump. Yes, is about empowering your employees.

cows drinking from the trough

The trough of success

“The trough of success” perked my ears. Used in context it’s a phrase that means, you are continuing to feed on past success and being stuck there at the trough of success is a guarantee of future failure.

photo of an elegant woman pointing the gun

The invasive Otter

In today’s meeting, a person I met with was sent a meeting recap from “me”. Otter had joined a meeting that I was invited to and then emailed them that person a recap of our meeting. I was very disturbed by this event

two lions in savannah

How to secure your network from OAuth permissions

You will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.