4 min read
Intune Integration With Azure Active Directory
Microsoft Intune and Azure Active Directory (Azure AD)—two powerful tools that, when combined, create a dynamic synergy...
By Don Wisdom on July 13, 2020
During the last several months COVID-19 has brought major changes to our work force, altering the work habits of most Americans for the time being. In fact, according to the SHRM Business Index, work at home has increased from 7% to over 60% in just a few months.
These uncertain times have turned office based employees to remote workers and has now introduced new security challenges. Research by Barracuda has found that spear phishing attacks have increased exponentially since the start of the COVID-19 outbreak. In fact according to the FBI's Internet Crime Complaint Center (IC3) , cybercrime cost $3.5 billion in losses in 2019 alone, with business email compromise causing the most damages.
Organizations must not only be educated on how to secure your email, but must also seek email cyber-security solutions to combat these threats. Here are 3 steps that organizations can take right now to reduce risks posed by email cyber criminals in the second half of 2020.
An audit of your current Microsoft Office 365 email security is time very well spent. Often, when we initially get involved with client O365 services, we discover that the O365 tenant settings have not been reviewed by the tenant owners. Microsoft security settings include alerts, permissions, data governance and reporting that help you secure your email services. We help guide our clients through these settings to find the right balance of security and productivity.
This document should provide the framework for how employees handle, share, and store sensitive data within your organization. The policy document should address password management systems, password policies, how frequently data is backed up, and acceptable use policies for both company owned and employee owned devices, applications, and services. For some templates to start your policy please click the button below.
Post COVID-19, cyber criminal groups have shifted their attention to remote workers as soft targets. Criminals look to exploit easy to guess passwords without additional authentication through brute force techniques. Once they have access, they can elevate their rights to admin level and uninstall security solutions and then run ransomware to encrypt organization data. A proper defense is to block external geo’s and require multi-factor authentication from your remote workers. The addition of a A/D monitoring solution will also provide visibility in real time of criminals that elevate privileges to start attacks.
Apr 18, 2024by Jaden Hauptman
Microsoft Intune and Azure Active Directory (Azure AD)—two powerful tools that, when combined, create a dynamic synergy...
Apr 15, 2024by Ben Minkin
In today’s digital landscape, cybersecurity professionals face an uphill battle in terms of managing constantly...
Apr 12, 2024by Jaden Hauptman
OneNote is a versatile digital note-taking app that serves as your personal repository for capturing, organizing, and...
Contact Datalink Networks