Trusted Platform Module (TPM) and Windows Features

The following table defines which Windows features require TPM support. TPM AND WINDOWS FEATURES Windows Features TPM Required Supports TPM 1.2 Supports TPM 2.0 Details Measured Boot Yes Yes Yes Measured Boot requires TPM 1.2 or 2.0 and UEFI Secure Boot. TPM 2.0 is recommended since it supports newer cryptographic algorithms. TPM 1.2 only supports the SHA-1 algorithm which is being deprecated. BitLocker No Yes Yes TPM 1.2 or 2.0 are ...

Read More

The Microsoft Identity Manager (MIM)

Today, many businesses in Corporate America are now implementing more than one level of authentication in order to confirm the identity of an individual.  Many of them have implemented at least Two Factor Authentication (2FA) or even Multifactor Authentication (MFA).  But trying to keep track of all of these authentication levels and mechanisms can be ...

Read More

How To Create A Playbook In Azure Sentinel – Part 2

In our last article, we examined the concept of what a Playbook is, and how to create one specifically for the Azure Sentinel platform.  Specifically, the following topics were covered; Creating the Playbook; Establishing The Trigger Point. In this article, we continue with theme of creating the Playbook, but looking at more advanced functionalities. How To Steps ...

Read More

How To Create A Playbook In Azure Sentinel

As we know, many IT Security teams across Corporate America are totally overburdened with the many alerts and warnings that they receive from their network security tools. CISOs are realizing this and are taking more steps to help alleviate the phenomenon which is known as “Alert Fatigue”. For example, they are strategically placing technologies in ...

Read More

How To Prevent Data Loss With Azure

One of the hottest topics today in the world of Cybersecurity is that of Data Loss. To some degree or another, most companies have experienced this one way or another, whether it was intentional or not. But given that many employees are using their personal devices to do their daily job tasks, this has dramatically ...

Read More

Valentine’s Day Phishing Heartbreaks

It is time to remind your users that heartless con artists use social engineering tactics to trick people looking for love.  The FBI's Internet Crime Complaint Center warns every year that scammers use poetry, flowers, and other gifts to reel in victims, the entire time declaring their "undying love." These callous criminals -- who also troll ...

Read More

What Do Email Phishing Scams Do? Best Practices for Protecting Your Information

Email Phishing scams are carried out online by tech-savvy con artists and identity theft criminals. They use spam, fake websites constructed to look identical to real sites, email and instant messages to trick you into divulging sensitive information, like bank account passwords and credit card numbers. Once you take the phisher's bait, they can use ...

Read More

How to Recover from A Phishing Attack – Part 1

Introduction Our last series of blogs closely examined the details of a Spear Phishing Attack. But whoever or whatever the target is, once the damage is done, efforts need to be taken to mitigate the damage, and try to find ways so that these types of attacks don’t happen again. In this series of blogs, we examine ...

Read More

How to Recover from A Phishing Attack – Part 2

Introduction Our last blog examined the steps that you need to take in order to recover from a Phishing attack. In this one, we can continue with that theme. The Steps Remediation: This is deemed to be one of the most critical phases; as this is where the damage of the Phishing attack will be contained. This ...

Read More

An Introduction to Spear Phishing – Part 1

Introduction to Spear Phishing As we know it today, Phishing has become one of the most commonly used tactics by the Cyber attacker in order to garner personal information and data.  This primarily involves our physical addresses, E-Mail addresses, credit card numbers, banking and other types and kinds of financial information, Social Security numbers, etc. Phishing involves ...

Read More