Blog

Document Sensitivity In M365

Document sensitivity refers to the classification of documents based on their level of confidentiality. It is a way of ensuring that sensitive information is protected from unauthorized access and disclosure. Sensitivity labels can be applied to files and emails to keep them compliant with your organization’s information protection policies. The labels can be applied manually ...

Read More

Microsoft Defender For Endpoint

Microsoft has come out with numerous tools to protect clients that are either in Azure or On Prem, or perhaps even a mixture of both.  One such product is called Defender for Endpoint which is further reviewed in this article. What Is The Defender For Endpoint? Think of your traditional antivirus or anti-malware software package, but multiply ...

Read More

Microsoft Defender For Identity

Our last article reviewed how Microsoft Defender can be used for a Cloud based deployment in Azure.  In this article, we examine how it can be used for identity purposes, which is very much a hot button topic today. What Is Microsoft Defender? Defender for Identity used to be called Azure Advanced Threat Protection, or Azure ATP.  ...

Read More

The Microsoft Defender For Cloud

With the Cyber landscape changing on a minute-by-minute basis, businesses all over the world need to make sure that their Cloud deployments in Azure are well fortified.  In this regard, a new tool from Microsoft called the “Defender For Cloud” has been designed to fit this role, and is further reviewed in this article. What Is ...

Read More

Microsoft MFA & Licensing

In today’s world, the use of multiple layers of security has become a requirement.  Gone are the days when just the password would suffice.  Now, many companies across corporate America are requiring Two Factor Authentication, and in many cases, Multifactor Authentication (MFA).  This is the situation where at least three or more authentication mechanisms are ...

Read More

An Introduction to Data Loss Prevention (DLP)

One of our previous articles reviewed a new solution from Microsoft, called Purview. It is essentially a governance tool, designed to help your organization come under compliance with the many data privacy laws (such as those of the GDPR, CCPA, HIPAA, etc.). But data leakage continues to be a problem, and in this article, we ...

Read More

Introducing Microsoft Entra

In some of our previous blog articles, the concept of Identity and Access Management (IAM) was reviewed, and its importance in the world of Cybersecurity today.  Essentially, the primary goal of IAM is to give the company the ability to effectively 2FA and even 3FA Identity based solutions in a quick, automated manner.  But there ...

Read More

An Introduction To Microsoft Purview

  When compared to many of the Cloud providers, Microsoft is for sure making leaps and bounds in the areas of data privacy.  Probably one of the best advancements it has made for the latter is in the CMMC, creating new tools for the Defense Industrial Base (DIB).  But they are also making privacy and compliance ...

Read More

An Introduction To Microsoft Priva

As the world becomes even more digital, data privacy is will continue to remain a huge concern amongst businesses in Corporate America.  Whether it is data leakage issues or coming into compliance with the provisions of the GDPR, CCPA, HIPAA, etc.  this is a subject area which will be at the top of the list ...

Read More

An Introduction To Threat Modeling

Introduction In the world of Cybersecurity today, there are obviously many tools and technologies today that only will help you thwart off any kind of incoming threats, but even predict what future ones could possibly look like.  But technology can only go so far at times, and thus, it is necessary to go back to the ...

Read More