Our Blog

Defending Against Illicit Consent Attacks

Towards the close of 2019 a new variety of phishing attack surfaced, targeting Office 365 specifically. This attack is notable in that it does not harvest end user credentials (as is the norm) but exploits how Office 365 handles third-party add on content.

About Microsoft’s New Edge Browser

This week marks the launch of Microsoft’s new browser, a totally revamped version of Edge, the primary browser for Windows 10. With this release, Microsoft aims to provide a new web browsing experience tailored to the needs of the enterprise.

The new browser is essentially a from-the-ground-up rebuild of the Edge, offering improved privacy feature sets to help users control and understand how their browsing data is used.

5 Office 365 Security Faults to Avoid

Last fall, the US Department of Homeland Security undertook a multi-month assessment of Office 365 tenants managed by various businesses. As of this month CISA has published their findings. The study has illuminated common configuration errors that can put data at risk.

New Security Event Analysis Tools Coming to Azure!

In today’s cybersecurity landscape, it is highly important to maintain a robust security system to cover all potential breach points in your IT environment. This can present a problem in itself, however, as utilizing many different security services with their own decentralized interface can result in some alerts being missed when maintaining an Eyes on Glass1 approach to your security.

What are Microsoft’s New Security Plans?

When it comes to cyber security, threats like email phishing and spoofing remain very real risks regardless of business size. To combat such threats, Microsoft has developed a number of intelligent solutions designed to identify cyberthreat before it can impact operations.

Password-less Logins Coming to Microsoft 365

When we think about account security, we tend to consider passwords a given. As cybersecurity technologies have advanced, however, passwords have become less and less viable as a primary protection method.

Today, passwords often pose more risk than protection because they are a single point of failure against intrusion.

Office 365 Backup: Is it worth it?

As a cloud service, one of the major benefits of Office 365 is its reliability and resilience to various incidents that would otherwise disrupt on-premises servers. Notably, cloud hosting eliminates the need to regularly replace aging hardware and mitigates the risks of failure caused by older equipment.

Is Windows Defender Good Enough? An Overview of Microsoft’s Anti-Virus

When it comes to defending against malware, installing an anti-virus is the first step many users will take. Choosing the right application can prove to be an overwhelming task, however, simply due to the sheer number of options available. For users grappling with this question, their best option is likely already installed to their device.

Phishing in 2018 – What to Look Out For

As a managed service provider, our clients often forward us emails that they suspect may be a phishing attempt. They trust us, so they often leave it to us to determine what’s legitimate and what’s fake. Some are obvious, some are tricky, but one thing that’s different today is the craftiness of the scammer.

How to Block Ransomware in Windows 10

By John Bath

We’ve written extensively about ransomware in the past, offering best practices for how users can identify threats and avoid the risks that may result in some unwarranted encryption. The biggest problem with ransomware is that, unlike our traditional conception of malware, little that can be done once files and drives are blocked (other than disconnecting the device from the network and wiping it).

While the methods cyber criminals use to attack are reportedly becoming more and more advanced, so too are the methods used to combat them.