Blog

New Microsoft Defender XDR for Small Business

In one of our previous blogs, we had reviewed the Microsoft XDR in detail.  But recently, Microsoft has come out with a recent edition of this platform that’s geared specifically towards the SMB (Small to Medium Sized Business) market.  In this blog, we take a look at this newer edition. What Are The Features? With this platform ...

Read More

Microsoft’s CMMC Program – Step 5: Security Management

With this article, we now approach the last phase of preparing for your CMMC Certification, which is planning the ongoing maintenance of your security program. How It Is Done This realm falls under the category of what is known as Security Management.  Obviously, you are going to have many controls in place in which you are going ...

Read More

Microsoft’s CMMC Program – Step 4: CMMC Implementation

Our last article examined the Gap Assessment that is necessary in order to achieve full CMMC compliance.  In this one, we look at yet another different process, and that is how to implement everything with the Microsoft security stack. What Is All About As it was described previously, the purpose of the Gap Analysis is to discover, ...

Read More

Don’t Let Hackers Ruin Your Holidays

Online shopping has become more popular than ever before. In 2020, more than 2 billion people bought products or services online. Whether they’re shopping online because it’s more convenient or they’re avoiding going to brick-and-mortar retailers during the ongoing pandemic, more people are turning to online retailers every day. It’s not just the convenience or health ...

Read More

Microsoft & Deep Learning

  As we all know, AI is one of the biggest buzzwords being bandied about today in the world of Cybersecurity.  Essentially, this is the area where the thought and reasoning processes of the human mind are being “mimicked” in the real world for our benefits, especially to help speed up routine tasks, and try to ...

Read More

The Microsoft Metaverse

The world that we live in today is very much different than even two years ago.  There have been many advances in digital technology, a trend that experts thought would take years to happen, but now we are seeing it come to full life in just a matter of a few months.  It is not ...

Read More

Microsoft’s CMMC Program – Step 1: NIST 800-171 Assessment

For the last year or so, the CMMC 2.0 (Cybersecurity Maturity Model Certification) has been a big deal amongst the Defense Industrial Base, also known as the DIB.  This is essentially the group of defense contractors and their counterparts that are currently doing work for the Department of Defense or are in the process of ...

Read More

Microsoft’s CMMC Program – Step 3: CMMC Gap Assessment

Our last article examined the steps that your organization needs to take in order to complete the scoring process.  This is an important step, as you will now have obtained a quantitative value that shows where your controls lie in terms of strengths and weaknesses. The next step is to get ready for the CMMC ...

Read More

Microsoft’s CMMC Program – Step 2: CMMC Scope Assessment

In our last article, we examined some of the various ways in which your organization and subcontractors can conduct an assessment in order to gauge what the status of your existing controls are, and in what areas they need to be improved upon.  This is all part of the effort to become compliant with the ...

Read More

Reported Flaw in Azure Active Directory (AAD)

We wanted to bring to your attention a recently reported flaw in Azure Active Directory (AAD) that references the ability for an attacker to 'brute force' passwords.  Firstly, what is AAD?  AAD is what Microsoft (and your organization) uses to identify your users and allows them to access your company data.  Secondly, what does it ...

Read More