Affinity Workforce secures its future with Microsoft 365

Posted by aeadmin on Oct 11, 2019 10:00:00 AM
Watch Affinity Workforce tackle modern security challenges with ease, utilizing the integrated and user-friendly Microsoft 365. With the heavy lifting of security already done, companies can save money and employees can focus on getting straight to the task at hand.
Read More

Tags: security, microsoft 365

Why a Cloud Access Security Broker Is Critical to IT Security

Posted by Troy Brittain on Jul 31, 2019 11:00:00 AM

 

Read More

Tags: Technology, SharePoint, cybersecurity, Microsoft, security, CASB

Top 4 Microsoft Office 365 Security & Compliance Best Practices

Posted by aeadmin on Jan 10, 2019 7:27:11 AM

 

At AdaptivEdge, we believe that security should be a part of every conversation, consultation, and solution we deliver. Our Security and Compliance experts have developed step-by-step instructions on how you can enhance the security of your Office 365 deployment.

Authored by Steve Andrews (Director Cloud Platform Services) & Raul Perez (Senior Microsoft Systems Engineer)

Read More

Tags: Adaptive Edge, O365, E5, Enterprise, Office 365, cybersecurity, Microsoft, security, Secure Score

Microsoft’s Defense-in-Depth Approach to Email Security

Posted by aeadmin on Aug 16, 2018 9:39:32 AM

 

While the use of collaboration tools is on the rise, email remains a vital component of corporate communications. It’s also a primary vector for malware distribution and attacks on endpoint devices. Most of these attacks attempt to exploit users rather than defeat security controls. In the 2018 Survey on Endpoint Protection and Response by the SANS Institute, 53 percent of IT professionals said their organizations had fallen victim to social engineering and phishing attacks, while half said they’d been impacted by ransomware.

Read More

Tags: cybersecurity, security

To Break the Cyberattack Chain, You Need the Right Tools

Posted by aeadmin on Jan 29, 2018 7:00:00 AM

 

In the military, the term “attack chain” or “kill chain” is used to describe how an attack is structured and executed, from identification of a target to selection of an appropriate weapon to the use of that weapon on the target. Reconnaissance operations are employed throughout the chain to monitor the movement and defense capabilities of the target and evaluate the impact of the attack.

Read More

Tags: adaptivedge, cybersecurity, identity, phishing, UEBA, cyberattack, security

How Azure Active Directory Premium Helps Secure the Identity Perimeter

Posted by aeadmin on Dec 15, 2017 10:00:00 AM

 

The days when users accessed corporate applications and data via desktops at the office are long past. Mobile devices enable anytime, anywhere access to both internal and cloud-based resources. The traditional network perimeter no longer exists.

Read More

Tags: Active Directory, adaptivedge, microsoft azure, cybersecurity, Microsoft, security

    Free Microsoft End of Support 1:1 Executive Briefing

    We're here to help!

    We'd love to find out more about the projects and initiatives you're working on to exchange ideas and provide some high-level guidance where we can.  We love learning from others as well as sharing some of our experience and lessons learned.  Let's talk!

    Subscribe to Email Updates

    Recent Posts

    Posts by Tag

    see all