Microsoft is striving to add more services and features to its GCC, GCC High and GCC DoD environments. To learn more about the services available in Microsoft 365 Government,see the following resources:
3 min read
23 min read
A successful Zero Trust strategy requires seamless and flexible access to applications, systems, and data while maintaining security for both users and the resources they need to do their jobs. It requires being cloud-ready, starting with identity, and then taking steps that will help secure all areas of your environment. Here's what you need to implement for Azure AD Identity Protection:
The team at BEMO came up with the most important questions to ask any business owner or company executive when determining their risk of a data breach. These questions, which can be answered in under 5 minutes, are meant to identify whether a business has the infrastructure to identify, classify, prevent, and if necessary, re-mediate the most common cyber-attacks.
4 min read
With 81 percent of data breaches being due to weak, reused, or stolen passwords, turning on Multi-Factor Authentication (MFA) on all of your apps is necessary. In this article we'll show you how to setup MFA for your Office 365 account paired with the Microsoft Authenticator smartphone app.
2 min read
I was approached by the Head of IT for a 70-something person company via LinkedIn, wanting an independent review of their environment. I thought sure, let's schedule a call to go over the details. This guy's company had an IT infrastructure of the future; the most well-prepared lead I had ever dealt with! Everyone in the company worked from home, connecting through a remote desktop, multi-factor authentication (MFA) was turned on for everyone, and they were all managed by Azure Active Directory (AD). On top of all that they already had tools to monitor their environment. This was going to be the quickest and easiest penetration test we had ever done! 😁
11 min read
MxToolbox is a free tool disposable to every IT and security team. We use it as part of our arsenal of tools for protecting our clients’ emails, ensuring we have enabled Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting & Conformance (DMARC). Don’t know what this gibberish means? No worries, we’ll explain what they mean, why they’re important, and how to enable them. Let’s get started!