Blog

An Introduction To The DMARC

Email Security Protocol When compared to the late 90’s when the first major Phishing attack occurred on AOL, there are many tools and mechanisms that are now available at your disposal to keep suspicious email from reaching into your inbox.  Although M365 and Microsoft Azure offer a plethora of offerings, there is yet another one which ...

Read More

Ensuring Email Deliverability

In a recent article, we examined some of the key issues that are involved with sending bulk emails to your prospects and customers.  Probably one of the worst consequences you can face is that of being completely blacklisted, where your domain is no longer accessible to the outside world. In this article, we look at some ...

Read More

Streamlining Endpoint Security: Mastering Software Inventory on Your Devices

by Tulasi Nakka In today’s digital landscape, it’s crucial to maintain visibility over the software installed across an organization’s devices to ensure security and compliance. The challenge lies in the vast amount of data and the limited tools available for analysis. Guard+ was developed as a tool for Managers and senior security analysts to provide a ...

Read More

Are Business Premium Licenses Adequate for Security?

When it comes to selecting the right Microsoft 365 license for your business, understanding the security features and limitations of each option is crucial. Microsoft 365 Business Premium is designed for small to medium-sized businesses, while the Enterprise E3 and E5 licenses cater to larger organizations with more complex needs. Let's break down the key ...

Read More

Maximizing Security with MFA: What Your Sign In Reports Reveal

By: Tulasi Nakka Introduction In today's digital age, robust security is more crucial than ever, with cyber threats growing increasingly sophisticated. One of the most effective ways to protect sensitive data is through Multi-Factor Authentication (MFA), which adds an extra layer of security by requiring multiple forms of verification. This article explores the importance of MFA in modern ...

Read More

The World’s Largest Cybersecurity Breach

In the wee hours of Friday morning, July 19th, the world succumbed to what is now possibly  the world’s largest security breach.  In fact, it is deemed to be even larger than that of the Solar Winds Attack, in which thousands of individuals and businesses were impacted.  But with this one that happened today, countries ...

Read More

An Introduction To the Microsoft Purview AI Hub

Introduction For those of use in the technology world, Artificial Intelligence (AI) has become the biggest buzzword of late, as well as the hottest trend.  Microsoft is a pioneer in this field, driven by its partnership with OpenAI (the creators of ChatGPT).  They have just announced a new product called the “Purview AI Hub”, and will ...

Read More

What is Conditional Access?

Conditional Access (CA) is a security policy enforcement solution available with your Azure AD Premium P1 or Microsoft 365 Business Premium subscription. Once users initiate the log-in process with a password, the application employs If/Then logic to grant access or deny access based on certain conditions or “signals.” Common Conditions Correct Username and Password Location of Login Device ...

Read More

The Licensing For Defender Vulnerability Management

There is no doubt that Microsoft has a lot of licensing and subscription plans for their various M365 products, and it can cause quite a bit of confusion for the end user.  In this article, we attempt to resolve some of these issues by focusing on the Defender Vulnerability Management package. What Is Defender Vulnerability Management? Before ...

Read More

Which Licenses Do I Need? The Differences Between M365 And GCC High

At the present time, M365 is predominantly being used by both businesses and even the Federal Government.  But, there are many different flavors of it that exist, especially between the private and the public sectors.  In this article, we take a closer look at two of them:  The Commercial M365 and the M365 for the ...

Read More