Author Archive

BitLocker Essentials: Protecting Your Data with Advanced Encryption

BitLocker is a Windows security feature designed to protect data by encrypting drives, making it inaccessible to unauthorized users. This document provides an overview of BitLocker, its types, recovery methods, and potential activation reasons. What Is It? There are two main types of BitLocker: Device Encryption, which is enabled by default and covers the entire device, and ...

Read More

An Overview of GDAP

One of the biggest concerns in Cybersecurity today is that of making sure employees, third party vendors, etc. have all been assigned the optimal mix of rights, permissions, and privileges to conduct their everyday job tasks.  However, trying to do this is a lot harder than it looks.  For example, you do not want to ...

Read More

Backdoor Attacks

Backdoor Attacks We all have heard, and perhaps even been a victim of a Cyberattack (hopefully that is not the case).  Some of the most common types of attacks that we hear of today are things like Phishing, Ransomware, Insider Threats, etc.  But there is another one that lurks out there, which has not appeared too ...

Read More

The Permission Creep Index

One of the greatest risks to businesses today is the over-assignment of rights, permissions, and privileges to employees.  Therefore, CISOs, managers, etc. are all taught to adopt the concept of “Least “Privilege”.  This is where you give your employees just enough of what they need to conduct their daily job tasks, no more and no ...

Read More

Proposed Changes To The CMMC 2.1

The CMMC is an acronym that stands for the “Cybersecurity Maturity Model Certification”.  As our past article and whitepapers have covered  extensively, it is essentially where the Defense Industrial Base and their subcontractors have to achieve a certain level of certification before they are allowed to bid for work-related contracts.  We are now in the ...

Read More

Color Coding Your Outlook Calendars

Microsoft Outlook remains one of the most widely used email systems in the world today, along with it’s calendar.  But in today’s world, many business executives and employees literally live and die by their calendars. In fact, at times, it can even be hard to see all of the appointments at first glance.  So to make ...

Read More

Setting Up The Session Border Control For GCC High

As you know, the GCC (Government Community Cloud) is a specialized type of Cloud deployment that allows defense contractors to secure datasets provided to them from the DoD.  GCC High, is a separate data center that meets the Government standard for security and is located in the Continental United States and managed by US citizens. ...

Read More

Introducing Microsoft Entra

In some of our previous blog articles, the concept of Identity and Access Management (IAM) was reviewed, and its importance in the world of Cybersecurity today.  Essentially, the primary goal of IAM is to give the company the ability to effectively 2FA and even 3FA Identity based solutions in a quick, automated manner.  But there ...

Read More

Microsoft DNS Filtering

In the world that we live in today, just about anything can be considered as prey for the Cyber-attacker.  As we have seen with this pandemic, one of the favorite targets has been that of the heisting of domain names in order to create spoofed ones, in which the unsuspecting victim is lured into. One method ...

Read More

Raise your Security Game with Microsoft’s Conditional Access

In today’s digital world, you hear a lot about granting privileges, rights, and accesses to shared resources on the most minimal level possible.  Technically, this is known as the concept of “Least Privilege”, and it simply means that you are giving your employees just what they need in terms of access to shared resources in ...

Read More