Olive Press: the O+G Blog
Marketing

Our first post on applying Challenger Sales methodology in your marketing outlined how to change and shape your marketing materials. However going through that process without ensuring alignment between your sales organization and your marketing organization will result in failure almost every time. As sales organizations train their employees in Challenger Sales best practices, it […]

Device Management
ANDROID ENTERPRISE ENROLLMENT
March 21, 2019

We all have heard about Windows Autopilot by now. It is a great product with a seamless out of the box experience (“OOBE”) for Windows devices and above all simplifies the IT admin and end user’s life. Apple’s DEP Program is also quite seamless for end users, and works well with Intune, but what options […]

Security

A friend of mine recently took to social media to complain about his bank website’s newly-implemented two-factor authentication system. And I have to agree – having to enter your account credentials plus receive a phone call or text and enter a 6-digit code on my device is just not a great user experience. But as […]

Sales

An ongoing debate rages around which sales methodology is the most effective. Within that debate, one of the trending topics has been the rise of the Challenger Sales methodology, based on Matthew Dixon and Brent Adamson’s popular 2011 book The Challenger Sale: Taking Control of the Customer Conversation. What exactly is Challenger– and why is […]

Cloud Services
Windows Autopilot – Closer to perfect
October 30, 2018

In the 16 months since it was announced, Windows Autopilot has revolutionized the way Windows devices are configured and deployed. Leveraging Microsoft’s cloud technology, Autopilot allows you to set up and pre-configure new Windows 10 devices while eliminating the cost and complexity associated with mass deployments. Prior to Autopilot, the standard procedure for such deployments involved building […]

Security

Hackers will go to surprising lengths to infiltrate an organization’s network, typically using threat vectors such as email attachments, websites, and USB removable media as a starting point. Once your account credentials or machine has been compromised, an attacker will typically install a remote trojan or backdoor on your system that allows the attacker to […]

Security

In our business, Olive + Goose works with many industries subject to stringent security requirements, including health care, pharmaceuticals, and defense. Unfortunately, many customers only come to us for help AFTER they have had a security breach. One common scenario that we see involves a phishing attack allowing a bad actor access to a compromised […]