Blog

The Microsoft Defender For Cloud

With the Cyber landscape changing on a minute-by-minute basis, businesses all over the world need to make sure that their Cloud deployments in Azure are well fortified.  In this regard, a new tool from Microsoft called the “Defender For Cloud” has been designed to fit this role, and is further reviewed in this article. What Is ...

Read More

Microsoft MFA & Licensing

In today’s world, the use of multiple layers of security has become a requirement.  Gone are the days when just the password would suffice.  Now, many companies across corporate America are requiring Two Factor Authentication, and in many cases, Multifactor Authentication (MFA).  This is the situation where at least three or more authentication mechanisms are ...

Read More

An Introduction to Data Loss Prevention (DLP)

One of our previous articles reviewed a new solution from Microsoft, called Purview. It is essentially a governance tool, designed to help your organization come under compliance with the many data privacy laws (such as those of the GDPR, CCPA, HIPAA, etc.). But data leakage continues to be a problem, and in this article, we ...

Read More

Introducing Microsoft Entra

In some of our previous blog articles, the concept of Identity and Access Management (IAM) was reviewed, and its importance in the world of Cybersecurity today.  Essentially, the primary goal of IAM is to give the company the ability to effectively 2FA and even 3FA Identity based solutions in a quick, automated manner.  But there ...

Read More

An Introduction To Microsoft Purview

  When compared to many of the Cloud providers, Microsoft is for sure making leaps and bounds in the areas of data privacy.  Probably one of the best advancements it has made for the latter is in the CMMC, creating new tools for the Defense Industrial Base (DIB).  But they are also making privacy and compliance ...

Read More

An Introduction To Microsoft Priva

As the world becomes even more digital, data privacy is will continue to remain a huge concern amongst businesses in Corporate America.  Whether it is data leakage issues or coming into compliance with the provisions of the GDPR, CCPA, HIPAA, etc.  this is a subject area which will be at the top of the list ...

Read More

An Introduction To Threat Modeling

Introduction In the world of Cybersecurity today, there are obviously many tools and technologies today that only will help you thwart off any kind of incoming threats, but even predict what future ones could possibly look like.  But technology can only go so far at times, and thus, it is necessary to go back to the ...

Read More

How To Use Microsoft Email Encryption

Introduction Cybersecurity is now at the front and center of everybody’s mind.  This is especially true when it comes to all of forms of digital communications, including email.  We want to be sure that the messages that are sent back and forth remain safe and intact.  The best way to do this is via encryption and ...

Read More

HIPAA/HITECH COMPLIANCE

Introduction Most of us have at least heard of the GDPR (General Data Protection Regulation) and the  CCPA (California Consumer Privacy Regulation). These are the key data privacy laws that ensure the appropriate controls are put into place to in order help safeguard the PII (Personally Identifiable Information) datasets that businesses store. But there is also ...

Read More

Zero Click Security Alert

There is a vulnerability (potentially zero-click) that can be exploited on Chromium based browsers (Chrome, Microsoft Edge, etc.). Because of the rush from Google and Microsoft to get a patch out and the lack of protection available if it is indeed zero-click necessary, we recommend ensuring all browsers are up to date as of 03/29/22 or ...

Read More