Blog

The Need For Centralizing Policy and Management Operations

As businesses are moving towards the Cloud, especially that of Microsoft Azure, the need for centralization is becoming of paramount importance.  Whether it is your security policies, or even your Microsoft 365 apps, you need to make sure that you and your IT Security team can access critical information and data in just a matter ...

Read More

The Permission Creep Index

One of the greatest risks to businesses today is the over-assignment of rights, permissions, and privileges to employees.  Therefore, CISOs, managers, etc. are all taught to adopt the concept of “Least “Privilege”.  This is where you give your employees just enough of what they need to conduct their daily job tasks, no more and no ...

Read More

Cybersecurity Awareness Month

In today’s Cybersecurity world, awareness is a hot topic.  Whether it is being aware of your physical surroundings, or when you are online, one has to be proactive to help insure that they do not become the next victim of a Cyberattack.  In order to promote the sheer importance of this, October has been designated ...

Read More

Document Sensitivity In M365

Document sensitivity refers to the classification of documents based on their level of confidentiality. It is a way of ensuring that sensitive information is protected from unauthorized access and disclosure. Sensitivity labels can be applied to files and emails to keep them compliant with your organization’s information protection policies. The labels can be applied manually ...

Read More

Microsoft Defender For Endpoint

Microsoft has come out with numerous tools to protect clients that are either in Azure or On Prem, or perhaps even a mixture of both.  One such product is called Defender for Endpoint which is further reviewed in this article. What Is The Defender For Endpoint? Think of your traditional antivirus or anti-malware software package, but multiply ...

Read More

Microsoft Defender For Identity

Our last article reviewed how Microsoft Defender can be used for a Cloud based deployment in Azure.  In this article, we examine how it can be used for identity purposes, which is very much a hot button topic today. What Is Microsoft Defender? Defender for Identity used to be called Azure Advanced Threat Protection, or Azure ATP.  ...

Read More

The Microsoft Defender For Cloud

With the Cyber landscape changing on a minute-by-minute basis, businesses all over the world need to make sure that their Cloud deployments in Azure are well fortified.  In this regard, a new tool from Microsoft called the “Defender For Cloud” has been designed to fit this role, and is further reviewed in this article. What Is ...

Read More

Microsoft MFA & Licensing

In today’s world, the use of multiple layers of security has become a requirement.  Gone are the days when just the password would suffice.  Now, many companies across corporate America are requiring Two Factor Authentication, and in many cases, Multifactor Authentication (MFA).  This is the situation where at least three or more authentication mechanisms are ...

Read More

An Introduction to Data Loss Prevention (DLP)

One of our previous articles reviewed a new solution from Microsoft, called Purview. It is essentially a governance tool, designed to help your organization come under compliance with the many data privacy laws (such as those of the GDPR, CCPA, HIPAA, etc.). But data leakage continues to be a problem, and in this article, we ...

Read More

Introducing Microsoft Entra

In some of our previous blog articles, the concept of Identity and Access Management (IAM) was reviewed, and its importance in the world of Cybersecurity today.  Essentially, the primary goal of IAM is to give the company the ability to effectively 2FA and even 3FA Identity based solutions in a quick, automated manner.  But there ...

Read More