Cybersecurity Blog

23 min read

Azure AD Identity Protection: 17 Best Practices

By Bruno Lecoq on Oct 22, 2019 12:29:29 PM

A successful Zero Trust strategy requires seamless and flexible access to applications, systems, and data while maintaining security for both users and the resources they need to do their jobs. It requires being cloud-ready, starting with identity, and then taking steps that will help secure all areas of your environment. Here's what you need to implement for Azure AD Identity Protection:

Continue Reading

Will Your Business Get Hacked? (Quiz)

By Brandon Lecoq on Sep 24, 2019 9:35:04 AM

The team at BEMO came up with the most important questions to ask any business owner or company executive when determining their risk of a data breach. These questions, which can be answered in under 5 minutes, are meant to identify whether a business has the infrastructure to identify, classify, prevent, and if necessary, re-mediate the most common cyber-attacks.

Topics: Cybersecurity
Continue Reading
4 min read

Office 365 MFA Setup: Step-by-Step Instructions

By Bruno Lecoq on Sep 16, 2019 1:55:00 PM

With 81 percent of data breaches being due to weak, reused, or stolen passwords, turning on Multi-Factor Authentication (MFA) on all of your apps is necessary. In this article we'll show you how to setup MFA for your Office 365 account paired with the Microsoft Authenticator smartphone app.

Continue Reading
2 min read

Azure MFA Loophole: Why am I still under attack?

By Brandon Lecoq on Aug 28, 2019 9:11:05 AM

I was approached by the Head of IT for a 70-something person company via LinkedIn, wanting an independent review of their environment. I thought sure, let's schedule a call to go over the details. This guy's company had an IT infrastructure of the future; the most well-prepared lead I had ever dealt with! Everyone in the company worked from home, connecting through a remote desktop, multi-factor authentication (MFA) was turned on for everyone, and they were all managed by Azure Active Directory (AD). On top of all that they already had tools to monitor their environment. This was going to be the quickest and easiest penetration test we had ever done! 😁

Continue Reading
11 min read

MxToolbox: How to Enable SPF, DMARC, and DKIM

By Bruno Lecoq on Jun 28, 2019 9:49:45 AM

MxToolbox is a free tool disposable to every IT and security team. We use it as part of our arsenal of tools for protecting our clients’ emails, ensuring we have enabled Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting & Conformance (DMARC). Don’t know what this gibberish means? No worries, we’ll explain what they mean, why they’re important, and how to enable them. Let’s get started!

Continue Reading