Blog

An Introduction to Data Loss Prevention (DLP)

One of our previous articles reviewed a new solution from Microsoft, called Purview. It is essentially a governance tool, designed to help your organization come under compliance with the many data privacy laws (such as those of the GDPR, CCPA, HIPAA, etc.). But data leakage continues to be a problem, and in this article, we ...

Read More

Introducing Microsoft Entra

In some of our previous blog articles, the concept of Identity and Access Management (IAM) was reviewed, and its importance in the world of Cybersecurity today.  Essentially, the primary goal of IAM is to give the company the ability to effectively 2FA and even 3FA Identity based solutions in a quick, automated manner.  But there ...

Read More

An Introduction To Microsoft Purview

  When compared to many of the Cloud providers, Microsoft is for sure making leaps and bounds in the areas of data privacy.  Probably one of the best advancements it has made for the latter is in the CMMC, creating new tools for the Defense Industrial Base (DIB).  But they are also making privacy and compliance ...

Read More

An Introduction To Microsoft Priva

As the world becomes even more digital, data privacy is will continue to remain a huge concern amongst businesses in Corporate America.  Whether it is data leakage issues or coming into compliance with the provisions of the GDPR, CCPA, HIPAA, etc.  this is a subject area which will be at the top of the list ...

Read More

An Introduction To Threat Modeling

Introduction In the world of Cybersecurity today, there are obviously many tools and technologies today that only will help you thwart off any kind of incoming threats, but even predict what future ones could possibly look like.  But technology can only go so far at times, and thus, it is necessary to go back to the ...

Read More

How To Use Microsoft Email Encryption

Introduction Cybersecurity is now at the front and center of everybody’s mind.  This is especially true when it comes to all of forms of digital communications, including email.  We want to be sure that the messages that are sent back and forth remain safe and intact.  The best way to do this is via encryption and ...

Read More

HIPAA/HITECH COMPLIANCE

Introduction Most of us have at least heard of the GDPR (General Data Protection Regulation) and the  CCPA (California Consumer Privacy Regulation). These are the key data privacy laws that ensure the appropriate controls are put into place to in order help safeguard the PII (Personally Identifiable Information) datasets that businesses store. But there is also ...

Read More

Zero Click Security Alert

There is a vulnerability (potentially zero-click) that can be exploited on Chromium based browsers (Chrome, Microsoft Edge, etc.). Because of the rush from Google and Microsoft to get a patch out and the lack of protection available if it is indeed zero-click necessary, we recommend ensuring all browsers are up to date as of 03/29/22 or ...

Read More

Microsoft DNS Filtering

In the world that we live in today, just about anything can be considered as prey for the Cyber-attacker.  As we have seen with this pandemic, one of the favorite targets has been that of the heisting of domain names in order to create spoofed ones, in which the unsuspecting victim is lured into. One method ...

Read More

Microsoft’s Endpoint Detection – what’s in P1 and P2?

Microsoft is known for its many licensing plans, but there are two of them that we have not covered in more detail. They are the EDR Plan 1 and Plan 2. They are examined more closely in this article. What Is In Plan 1? Here is what is included: It has the following types of functionalities: Other platforms ...

Read More