Blog

It’s Time To Wake Up To The Reality Of Cyber Security In 2022

All across the world, hackers are targeting and exploiting security weaknesses and holding data hostage. In May, the Colonial Pipeline was hit by a cyber-attack that disrupted fuel supplies along the East Coast for several days. The company – and the FBI – paid hackers $4.4 million in Bitcoin to regain control of the system. Colonial ...

Read More

Microsoft’s Endpoint Detection – what’s in P1 and P2?

Microsoft is known for its many licensing plans, but there are two of them that we have not covered in more detail. They are the EDR Plan 1 and Plan 2. They are examined more closely in this article. What Is In Plan 1? Here is what is included: It has the following types of functionalities: Other platforms ...

Read More

Raise your Security Game with Microsoft’s Conditional Access

In today’s digital world, you hear a lot about granting privileges, rights, and accesses to shared resources on the most minimal level possible.  Technically, this is known as the concept of “Least Privilege”, and it simply means that you are giving your employees just what they need in terms of access to shared resources in ...

Read More

Why Microsoft Identity is important for your Cybersecurity

As we start to roll into 2022, the one thing that will be on people’s mind’s is that of Cybersecurity.  It is expected that this year could be the same or even worse in terms of the intensity of attacks, especially that of Ransomware.  Another area which will get a close watch is software security, ...

Read More

The Best IT-Related Resolutions For The New Year

The past couple of years have been difficult for just about everyone. Business owners and entrepreneurs have had to adapt and evolve to survive in an ever-changing climate. There’s no telling when or even if things will go back to what we once thought was “normal.” As we enter a New Year, many business owners ...

Read More

Cybersecurity Predictions For 2022

There is no doubt that 2021 gave Cybersecurity professionals a run for their money, no matter what their line of expertise is.  A lot of this was fueled by the sheer onslaught of Ransomware attacks, which was totally unprecedented.  This trend is expected to continue going into 2022, but what are the other Cyber predictions?  ...

Read More

How To Configure A Graphics Based VM In Azure

It seems like on an almost daily basis, there are new developments that keep occurring in Microsoft Azure.  One such facet is making your newly deployed Virtual Machine (VM) into hosting graphics-based packages.  We review the necessary steps in this article. How To Do It Here is how you do it: 1) Select the right VM: You will need ...

Read More

New Microsoft Defender XDR for Small Business

In one of our previous blogs, we had reviewed the Microsoft XDR in detail.  But recently, Microsoft has come out with a recent edition of this platform that’s geared specifically towards the SMB (Small to Medium Sized Business) market.  In this blog, we take a look at this newer edition. What Are The Features? With this platform ...

Read More

Microsoft’s CMMC Program – Step 5: Security Management

With this article, we now approach the last phase of preparing for your CMMC Certification, which is planning the ongoing maintenance of your security program. How It Is Done This realm falls under the category of what is known as Security Management.  Obviously, you are going to have many controls in place in which you are going ...

Read More

Microsoft’s CMMC Program – Step 4: CMMC Implementation

Our last article examined the Gap Assessment that is necessary in order to achieve full CMMC compliance.  In this one, we look at yet another different process, and that is how to implement everything with the Microsoft security stack. What Is All About As it was described previously, the purpose of the Gap Analysis is to discover, ...

Read More