Business data stores are growing by as much as 65 percent annually, and a significant portion of that data is created, shared and maintained within the framework of Microsoft Office 365. All of the information stored in emails, OneDrive accounts and other Office 365 locations has costs and risks associated with it. That’s why data governance is a critical component of managing Office 365.
Read More
Tags:
Office 365,
Teams,
Governance,
Storage
Launched by Microsoft in 2001 as a server management tool, SharePoint has morphed into perhaps the world’s most popular workplace collaboration platform. It is used by some 200 million individuals across 300,000 customer organizations, including 85 percent of the Fortune 500.
Read More
Tags:
Technology,
Office 365,
SharePoint,
Microsoft
We’ve been talking about Microsoft Teams, and in our last post we provided some planning and implementation tips for maximizing the success of a Teams roll-out. Sure, Teams is intuitive and easy to use, but it can also have a big impact on organizational processes. It’s important to understand how various groups collaborate and help them use Teams to their best advantage.
Read More
Tags:
Technology,
Microsoft,
Teams
In our last post we described the core features and capabilities of Microsoft Teams. The application serves as a hub for applications, document sharing and meetings, with a persistent threaded chat feature that keeps teams engaged and informed. Microsoft Teams can easily be customized to meet diverse needs and has advanced security features to protect sensitive data.
Read More
Tags:
Technology,
Microsoft,
Teams
Almost 40 percent of employees will work remotely within 10 years, according to a recent survey by Upwork. Eighty-six percent of respondents said that escaping the confines of the office increases productivity by eliminating distractions and impromptu meetings.
Read More
Tags:
Technology,
Microsoft
In a recent alert, the U.S. Computer Emergency Readiness Team (US-CERT) said that about 85 percent of successful security breaches involve systems that have not been patched. A recent study by research firm Voke Media found that 82 percent of security breaches since 2015 occurred due to unapplied patches that had been available for up to a year.
Read More
Tags:
adaptivedge,
SCCM,
software update,
Microsoft,
SUP
In Part 1 of this post, we examined how two Microsoft solutions, Privileged Access Workstation (PAW) and Local Administrator Password Solution (LAPS), protect privileged accounts and the data and applications they use. PAW is capable of distinguishing privileged administrative accounts from normal user accounts. When a privileged account is recognized, PAW creates a hardened physical environment for sensitive tasks while preventing high-risk activity. LAPS automatically generates, encrypts and randomizes passwords based on security policies and simplifies password management.
Read More
Tags:
adaptivedge,
cybersecurity,
PAWS,
identity management,
privileged accounts
In a previous post, we discussed how to protect privileged accounts using robust identity management and authentication mechanisms to control access to company resources on a more granular level. We introduced three tools from Microsoft that can keep privileged accounts from being compromised – Microsoft Privileged Access Workstation (PAW), Local Administrator Password Solution (LAPS) and Privileged Access Management (PAM). In this post, we’ll take a deeper dive into PAW and LAPS.
Read More
Tags:
adaptivedge,
PAWS,
LAPS,
identity management,
privileged accounts
Over the last several posts, we’ve been discussing the need for a modern security strategy that protects the “identity perimeter” with special emphasis on securing privileged accounts. We also explained how user and entity behavior analytics can break the cyberattack chain by identifying and mitigating insider threats and compromised user credentials.
Read More
Tags:
adaptivedge,
cybersecurity,
identity management,
privileged accounts,
data loss prevention,
identity perimeter
In the military, the term “attack chain” or “kill chain” is used to describe how an attack is structured and executed, from identification of a target to selection of an appropriate weapon to the use of that weapon on the target. Reconnaissance operations are employed throughout the chain to monitor the movement and defense capabilities of the target and evaluate the impact of the attack.
Read More
Tags:
adaptivedge,
cybersecurity,
identity,
phishing,
UEBA,
cyberattack,
security