Blog

An Introduction To the Microsoft Purview AI Hub

Introduction For those of use in the technology world, Artificial Intelligence (AI) has become the biggest buzzword of late, as well as the hottest trend.  Microsoft is a pioneer in this field, driven by its partnership with OpenAI (the creators of ChatGPT).  They have just announced a new product called the “Purview AI Hub”, and will ...

Read More

What is Conditional Access?

Conditional Access (CA) is a security policy enforcement solution available with your Azure AD Premium P1 or Microsoft 365 Business Premium subscription. Once users initiate the log-in process with a password, the application employs If/Then logic to grant access or deny access based on certain conditions or “signals.” Common Conditions Correct Username and Password Location of Login Device ...

Read More

The Licensing For Defender Vulnerability Management

There is no doubt that Microsoft has a lot of licensing and subscription plans for their various M365 products, and it can cause quite a bit of confusion for the end user.  In this article, we attempt to resolve some of these issues by focusing on the Defender Vulnerability Management package. What Is Defender Vulnerability Management? Before ...

Read More

Which Licenses Do I Need? The Differences Between M365 And GCC High

At the present time, M365 is predominantly being used by both businesses and even the Federal Government.  But, there are many different flavors of it that exist, especially between the private and the public sectors.  In this article, we take a closer look at two of them:  The Commercial M365 and the M365 for the ...

Read More

How To Manage Volume Licensing In The M365 Portal

If your business is large enough, it is quite possible that you will require many licenses to procure for your end users.  Getting them in bulk, or even using just a couple of licenses on many wireless devices and/or computers is known as “Volume Licensing”.  In this article, we examine some ways in which you ...

Read More

Mastering Security with Azure Key Vault

Introduction: Azure Key Vaults are a cloud service designed to securely store and manage sensitive information such as API keys, passwords, certificates, and cryptographic keys. They provide a centralized platform to control access to these secrets, ensuring that they are protected and accessible only to authorized applications and services. If you are developing code for a ...

Read More

Backdoor Attacks

Backdoor Attacks We all have heard, and perhaps even been a victim of a Cyberattack (hopefully that is not the case).  Some of the most common types of attacks that we hear of today are things like Phishing, Ransomware, Insider Threats, etc.  But there is another one that lurks out there, which has not appeared too ...

Read More

The Need For Centralizing Policy and Management Operations

As businesses are moving towards the Cloud, especially that of Microsoft Azure, the need for centralization is becoming of paramount importance.  Whether it is your security policies, or even your Microsoft 365 apps, you need to make sure that you and your IT Security team can access critical information and data in just a matter ...

Read More

The Permission Creep Index

One of the greatest risks to businesses today is the over-assignment of rights, permissions, and privileges to employees.  Therefore, CISOs, managers, etc. are all taught to adopt the concept of “Least “Privilege”.  This is where you give your employees just enough of what they need to conduct their daily job tasks, no more and no ...

Read More

Cybersecurity Awareness Month

In today’s Cybersecurity world, awareness is a hot topic.  Whether it is being aware of your physical surroundings, or when you are online, one has to be proactive to help insure that they do not become the next victim of a Cyberattack.  In order to promote the sheer importance of this, October has been designated ...

Read More