January 25th Webinar: Innovation in Healthcare Powered by Microsoft Solutions in 2024

Key Cyber Risks for Financial Institutions During the Pandemic

Following with our blog series about cybersecurity and how organizations from different industries have been affected during the pandemic worldwide and have been pushed to re-think security as a business priority, and have changed the way of doing business, in this post I’ll focus on the key cyber risks for banks and other financial institutions […]

Healthcare Facing Cybercrime While Fighting the Pandemic

For the first time in history, a health crisis has shut down the entire global economy, demonstrating how inseparable healthcare and the economy have become. This also has brought a global increase of cybercrime targeting individuals as well as public and private organizations that have been directly involved in researching vaccines and treatments for Covid-19. […]

Learn About Microsoft Cloud App Security Policies

Continuing with our blog series about Cloud App Security where we’ve last shared a quick summary of on how to get started, we’ll talk about policies in today’s blog for you to get to know more . Cloud App Security Policies allow you to define the way you want your users to behave in the […]

Get started with Microsoft Cloud App Security

Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides a rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services as it was mentioned by us […]

Azure Information Protection Requirements and Features

  In our previous blog here, we talked about what Azure Information Protection means and what it can do for your organization. Today’s blog, will dive in into the requirements, policies, Labeling and more functionalities for your to learn. Azure Information Protection Requirements The requirements for individuals within your company who need to configure rights […]

Azure Information Protection

  Thanks to Office 365, the strapline “work from anywhere, at any time and on any device” has been made possible. Though there have been many advantages to the user, this new technology has been a great challenge for IT administrators and security officers that have seen how corporate data are stored in personal mobile […]

Office 365 Advanced Threat Protection Safe Links

Safe Links is a part of Advanced Threat Protection from Office 365 that provides time-of-click verification to an URL. This feature helps you rewrite every URL found in an coming email in order to redirect users through a Microsoft proxy server which checks when clicking in the link to validate if the URL is safe […]

Microsoft Cloud App Security

  A lot of organizations hesitate when thinking of going to the cloud with all its benefits and the challenge of keeping an organization safe, perhaps because the thought of losing control over some many aspects at a security level. In this blog, you’ll learn how Microsoft Cloud App can help your organization get the […]

Windows Defender Advanced Threat Protection – IV

Here we are, with the last part of our Windows Defender ATP blog series.  Let’s begin with Offboarding machines: Sometimes we must remove machines from the ATP Service.  This process is called offboarding. We can do this using Local Script. For Offboarding Windows 7 Sp1 and 8.1, Windows Server 2008 R2 SP1, 2012 R2 and 2016 […]

en_USEnglish