by Jesse Walter | Dec 9, 2021 | Cyber Security, Endpoint Management
Estimated Reading Time: 3 minutesThis post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little bit spread out, using Microsoft Defender for Identity will allow...
by Jesse Walter | Nov 4, 2021 | Cyber Security, Office 365
Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...
by Jesse Walter | Oct 27, 2021 | Cyber Security, Microsoft Defender
Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...
by Jesse Walter | Oct 22, 2021 | Cyber Security
Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...
by Jesse Walter | Oct 12, 2020 | Objur
Estimated Reading Time: 4 minutesEnd-user control + organizational oversight = increased compliance and consistency There are usually perfectly reasonable excuses for staff to postpone updates. Few people want to undermine their own productivity, especially when...