With the proliferation of BYOD (Bring Your Own Device), remote working, and 3rd party SaaS (Software as a Service) apps usage, that further promotes the “anywhere, any device” concept, more than ever, we need solutions that can help protect the company’s information. Continue reading Conditional Access in Azure Active Directory
Lumen21 as a Managed Services Provider offers a compliant cloud environment solution that can be purchased via the marketplace. Thus, enabling the customer a solution where they would not have to worry about the complexity of managing these environments using in PaaS and SaaS Applications. Regarding the custom applications, the customer will still have access into the PaaS and SaaS environments. Other than customer application updates and maintaining the solution, the customer will not need to worry about the compliance and regulatory requirements of the environment, as those will be covered by Lumen21. Continue reading Lumen21 Compliant Cloud Container
According to the study “On the Pulse” by Stroz Friedberg, around 87% percent of senior managers have admitted to sending corporate data to personal cloud storage and email, and as noted in an article by HPIAA Secure Now, around 58% percent of employees have accidentally sent information to the wrong person. Continue reading Windows Information Protection (WIP)
Microsoft SQL Database is a high-performance, reliable, and secure database environment you can use to build data-driven applications and websites in the programming language of your choice, without needing to manage infrastructure.
Azure SQL is a fully managed, relational Database-as-a-Service (DBaaS) in the Microsoft cloud (Azure). A Platform-as-a-Service (PaaS) offering, SQL Database delivers predictable performance, scalability with no downtime, business continuity, and data protection. Continue reading What is Azure SQL Database service?
IT asset management (also called IT inventory management) is an important part of an organization’s strategy. It usually involves gathering detailed hardware and software inventory information which is then used to make decisions about hardware and software purchases and redistribution. Continue reading Best Practices for IT Asset Management
When data is shared with a third-party vendor, keeping it secure can become a colossal effort. It’s not easy for businesses to protect customer data these days, particularly when they share it with their business or technology partners. Yes, we are talking about another data breach headline which affected millions of customer accounts at Verizon. Continue reading Cloud Leak: Verizon Data Breach Affects Millions of Customer Accounts
Before we learn about PAW security model, lets first understand what PAW is?
PAW (Privileged Access Workstations) is a mechanism that is used to help administrators or IT security officers to avoid the exposure of privileged credentials by attackers or criminals from your network. Continue reading Microsoft Privileged Access Workstation ‘PAW’ Security Model
A new strain of ransomware dubbed “Petya” is worming its way around the world with alarming speed. The malware is spreading using a vulnerability in Microsoft Windows that the software giant patched in March 2017 — the same bug that was exploited by the recent and prolific WannaCry ransomware strain. Continue reading Prevent Infection from Petya/NonPetya Ransomware Using a Single File
The idea of working nights is not a new one. It goes far back in history, as far back as the gatekeepers of ancient kingdoms that guarded the grounds at night. Their job was protecting their master from any threat. It wasn’t until the late 1800s that the concept of night shift changed. The invention of the light bulb allowed workers to work longer by illuminating the dark. Manufacturers in metal and textile mills jumped at the chance for increased production and higher profits. They introduced the concept of shift work. This meant they could split crews into groups and work around the clock. This allowed the production of more goods without the added pay of extra crew. Continue reading Tips to help you adjust to working the night shift
Azure Information Protection is a cloud-based solution that helps your business classify, label, and protect its documents and emails. This can be set automatically by the administrators based on defined rules and conditions, or manually by users, or a combination with recommended suggestions. Continue reading What is Azure Information Protection?