Microsoft’s Endpoint Detection – what’s in P1 and P2?

Microsoft is known for its many licensing plans, but there are two of them that we have not covered in more detail. They are the EDR Plan 1 and Plan 2. They are examined more closely in this article. What Is In Plan 1? Here is what is included: It has the following types of functionalities: Other platforms ...

Read More

Raise your Security Game with Microsoft’s Conditional Access

In today’s digital world, you hear a lot about granting privileges, rights, and accesses to shared resources on the most minimal level possible.  Technically, this is known as the concept of “Least Privilege”, and it simply means that you are giving your employees just what they need in terms of access to shared resources in ...

Read More

Why Microsoft Identity is important for your Cybersecurity

As we start to roll into 2022, the one thing that will be on people’s mind’s is that of Cybersecurity.  It is expected that this year could be the same or even worse in terms of the intensity of attacks, especially that of Ransomware.  Another area which will get a close watch is software security, ...

Read More

Cybersecurity Predictions For 2022

There is no doubt that 2021 gave Cybersecurity professionals a run for their money, no matter what their line of expertise is.  A lot of this was fueled by the sheer onslaught of Ransomware attacks, which was totally unprecedented.  This trend is expected to continue going into 2022, but what are the other Cyber predictions?  ...

Read More

New Microsoft Defender XDR for Small Business

In one of our previous blogs, we had reviewed the Microsoft XDR in detail.  But recently, Microsoft has come out with a recent edition of this platform that’s geared specifically towards the SMB (Small to Medium Sized Business) market.  In this blog, we take a look at this newer edition. What Are The Features? With this platform ...

Read More

Reported Flaw in Azure Active Directory (AAD)

We wanted to bring to your attention a recently reported flaw in Azure Active Directory (AAD) that references the ability for an attacker to 'brute force' passwords.  Firstly, what is AAD?  AAD is what Microsoft (and your organization) uses to identify your users and allows them to access your company data.  Secondly, what does it ...

Read More

Google Chrome Vulnerability (Actively Exploited Zero-Day Flaws)

Yesterday, September 30th, Google released an emergency update to fix two significant security vulnerabilities in the Google Chrome Internet browser.  If you use Chrome, or have Chrome installed, we strongly encourage you to verify Chrome is up to date with the most recent version.  One of the security vulnerabilities impacts Chrome even if you are ...

Read More

The Presidential Executive Order On Cybersecurity

The United States Federal Government has in recent years passed parts of key bills that relate to the Cybersecurity of this country.  But probably the most comprehensive one was just recently enacted by President Joe Biden, in the Executive Order that he signed on May 12th, 2021, primarily in response to all of the Ransomware ...

Read More

Microsoft Endpoint Manager

With COVID-19 and the mass migration to Work from Home (WFH) from the traditional office model, the focus on protecting company data in-transit and on both corporate and personal devices has increased.  The Zero Trust model of Security assumes every attempt to access information is a breach until the user proves who they are, and ...

Read More

An Overview Into The Azure Security Center

As a result of more people working from home, many businesses are now migrating their On-Premises IT/Network Infrastructures into the Cloud, namely Microsoft Azure.  While this does offer very significant advantages to a company, there can still be inherent security risks. To mitigate them, Microsoft has created a new platform known as the "Azure Security Center" ...

Read More