With the proliferation of BYOD (Bring Your Own Device), remote working, and 3rd party SaaS (Software as a Service) apps usage, that further promotes the “anywhere, any device” concept, more than ever, we need solutions that can help protect the company’s information. Continue reading Conditional Access in Azure Active Directory
Lumen21 as a Managed Services Provider offers a compliant cloud environment solution that can be purchased via the marketplace. Thus, enabling the customer a solution where they would not have to worry about the complexity of managing these environments using in PaaS and SaaS Applications. Regarding the custom applications, the customer will still have access into the PaaS and SaaS environments. Other than customer application updates and maintaining the solution, the customer will not need to worry about the compliance and regulatory requirements of the environment, as those will be covered by Lumen21. Continue reading Lumen21 Compliant Cloud Container
According to the study “On the Pulse” by Stroz Friedberg, around 87% percent of senior managers have admitted to sending corporate data to personal cloud storage and email, and as noted in an article by HPIAA Secure Now, around 58% percent of employees have accidentally sent information to the wrong person. Continue reading Windows Information Protection (WIP)
IT asset management (also called IT inventory management) is an important part of an organization’s strategy. It usually involves gathering detailed hardware and software inventory information which is then used to make decisions about hardware and software purchases and redistribution. Continue reading Best Practices for IT Asset Management
When data is shared with a third-party vendor, keeping it secure can become a colossal effort. It’s not easy for businesses to protect customer data these days, particularly when they share it with their business or technology partners. Yes, we are talking about another data breach headline which affected millions of customer accounts at Verizon. Continue reading Cloud Leak: Verizon Data Breach Affects Millions of Customer Accounts
Before we learn about PAW security model, lets first understand what PAW is?
PAW (Privileged Access Workstations) is a mechanism that is used to help administrators or IT security officers to avoid the exposure of privileged credentials by attackers or criminals from your network. Continue reading Microsoft Privileged Access Workstation ‘PAW’ Security Model
A new strain of ransomware dubbed “Petya” is worming its way around the world with alarming speed. The malware is spreading using a vulnerability in Microsoft Windows that the software giant patched in March 2017 — the same bug that was exploited by the recent and prolific WannaCry ransomware strain. Continue reading Prevent Infection from Petya/NonPetya Ransomware Using a Single File
Azure Information Protection is a cloud-based solution that helps your business classify, label, and protect its documents and emails. This can be set automatically by the administrators based on defined rules and conditions, or manually by users, or a combination with recommended suggestions. Continue reading What is Azure Information Protection?
Huge cyber-attack leveraging hacking tools widely believed to have brought disruption to Britain’s National Health System (NHS) on May 12th, 2017 and infected 99 other countries around the world. Continue reading Ransomware Awareness: WanaCrypt0r 2.0
By Sushma Chowta
What are Cyber-attacks?
An attack on your computer system by hackers to cause some kind of damage. It can be targeted towards Individuals, Organizations or Groups by stealing or destroying the company/personal data. It is also known as Cyber campaign, Cyber terrorism, Cyber warfare. Continue reading Cyber-attacks and measures to be taken