Our Blog

5 Office 365 Security Faults to Avoid

Last fall, the US Department of Homeland Security undertook a multi-month assessment of Office 365 tenants managed by various businesses. As of this month CISA has published their findings. The study has illuminated common configuration errors that can put data at risk.

New Security Event Analysis Tools Coming to Azure!

In today’s cybersecurity landscape, it is highly important to maintain a robust security system to cover all potential breach points in your IT environment. This can present a problem in itself, however, as utilizing many different security services with their own decentralized interface can result in some alerts being missed when maintaining an Eyes on Glass1 approach to your security.

What are Microsoft’s New Security Plans?

When it comes to cyber security, threats like email phishing and spoofing remain very real risks regardless of business size. To combat such threats, Microsoft has developed a number of intelligent solutions designed to identify cyberthreat before it can impact operations.

Password-less Logins Coming to Microsoft 365

When we think about account security, we tend to consider passwords a given. As cybersecurity technologies have advanced, however, passwords have become less and less viable as a primary protection method.

Today, passwords often pose more risk than protection because they are a single point of failure against intrusion.

Office 365 Backup: Is it worth it?

As a cloud service, one of the major benefits of Office 365 is its reliability and resilience to various incidents that would otherwise disrupt on-premises servers. Notably, cloud hosting eliminates the need to regularly replace aging hardware and mitigates the risks of failure caused by older equipment.

Is Windows Defender Good Enough? An Overview of Microsoft’s Anti-Virus

When it comes to defending against malware, installing an anti-virus is the first step many users will take. Choosing the right application can prove to be an overwhelming task, however, simply due to the sheer number of options available. For users grappling with this question, their best option is likely already installed to their device.

Phishing in 2018 – What to Look Out For

As a managed service provider, our clients often forward us emails that they suspect may be a phishing attempt. They trust us, so they often leave it to us to determine what’s legitimate and what’s fake. Some are obvious, some are tricky, but one thing that’s different today is the craftiness of the scammer.

How to Block Ransomware in Windows 10

By John Bath

We’ve written extensively about ransomware in the past, offering best practices for how users can identify threats and avoid the risks that may result in some unwarranted encryption. The biggest problem with ransomware is that, unlike our traditional conception of malware, little that can be done once files and drives are blocked (other than disconnecting the device from the network and wiping it).

While the methods cyber criminals use to attack are reportedly becoming more and more advanced, so too are the methods used to combat them.

Expanding Security & Compliance with Data Loss Prevention

What is DLP and how can it help protect your data? We cover common features of DLP and touch on how Microsoft is taking the service a step further.

For businesses dealing in sensitive data, be it their own IP or the personal info of their clients, prevention of data leakage is of the utmost concern to IT professionals.

Remote Desktop vs. Virtual Private Network: Which Should You Use?

One of the major concerns of technology professionals today is to protect users and data from various cyber threats. And just as there are many things to worry about, there are just as many tools to mitigate risks. Two such methodologies are the use of Virtual Private Networks (VPN) and Remote Desktops (RDP), which primarily serve to centralize and protect data systems albeit in different ways.

Read more 4 Comments