An Introduction To Threat Modeling

Introduction In the world of Cybersecurity today, there are obviously many tools and technologies today that only will help you thwart off any kind of incoming threats, but even predict what future ones could possibly look like.  But technology can only go so far at times, and thus, it is necessary to go back to the ...

Read More

How To Use Microsoft Email Encryption

Introduction Cybersecurity is now at the front and center of everybody’s mind.  This is especially true when it comes to all of forms of digital communications, including email.  We want to be sure that the messages that are sent back and forth remain safe and intact.  The best way to do this is via encryption and ...

Read More

Zero Click Security Alert

There is a vulnerability (potentially zero-click) that can be exploited on Chromium based browsers (Chrome, Microsoft Edge, etc.). Because of the rush from Google and Microsoft to get a patch out and the lack of protection available if it is indeed zero-click necessary, we recommend ensuring all browsers are up to date as of 03/29/22 or ...

Read More

HIPAA/HITECH COMPLIANCE

Introduction Most of us have at least heard of the GDPR (General Data Protection Regulation) and the  CCPA (California Consumer Privacy Regulation). These are the key data privacy laws that ensure the appropriate controls are put into place to in order help safeguard the PII (Personally Identifiable Information) datasets that businesses store. But there is also ...

Read More

Microsoft DNS Filtering

In the world that we live in today, just about anything can be considered as prey for the Cyber-attacker.  As we have seen with this pandemic, one of the favorite targets has been that of the heisting of domain names in order to create spoofed ones, in which the unsuspecting victim is lured into. One method ...

Read More

Microsoft’s Endpoint Detection – what’s in P1 and P2?

Microsoft is known for its many licensing plans, but there are two of them that we have not covered in more detail. They are the EDR Plan 1 and Plan 2. They are examined more closely in this article. What Is In Plan 1? Here is what is included: It has the following types of functionalities: Other platforms ...

Read More

Raise your Security Game with Microsoft’s Conditional Access

In today’s digital world, you hear a lot about granting privileges, rights, and accesses to shared resources on the most minimal level possible.  Technically, this is known as the concept of “Least Privilege”, and it simply means that you are giving your employees just what they need in terms of access to shared resources in ...

Read More

Why Microsoft Identity is important for your Cybersecurity

As we start to roll into 2022, the one thing that will be on people’s mind’s is that of Cybersecurity.  It is expected that this year could be the same or even worse in terms of the intensity of attacks, especially that of Ransomware.  Another area which will get a close watch is software security, ...

Read More

Cybersecurity Predictions For 2022

There is no doubt that 2021 gave Cybersecurity professionals a run for their money, no matter what their line of expertise is.  A lot of this was fueled by the sheer onslaught of Ransomware attacks, which was totally unprecedented.  This trend is expected to continue going into 2022, but what are the other Cyber predictions?  ...

Read More

New Microsoft Defender XDR for Small Business

In one of our previous blogs, we had reviewed the Microsoft XDR in detail.  But recently, Microsoft has come out with a recent edition of this platform that’s geared specifically towards the SMB (Small to Medium Sized Business) market.  In this blog, we take a look at this newer edition. What Are The Features? With this platform ...

Read More