Practical Protection: Breaches, Exposure, and You
In this edition of Practical Protection, Paul Robichaux dives into 5 steps you can take to protect yourself, and potentially your organization, from future breaches.
In this edition of Practical Protection, Paul Robichaux dives into 5 steps you can take to protect yourself, and potentially your organization, from future breaches.
Microsoft recently released a revamped version of LAPS that can store the local admin password in Entra ID to work with cloud-managed endpoints. In this blog, we dive into deploying LAPS and how to use it to further enhance the security of Windows endpoints.
Microsoft introduces Microsoft Security Exposure Management (MSEM)! In this blog, Paul discusses MSEM and offers some advice for things you can do before the tool is pushed to GA.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.
In this blog, we review a new organized phishing campaign impacting Azure Cloud environments and discuss what to do if your organization happens to fall victim.
Microsoft released cumulative update 14 for Exchange Server 2019 on February 13, 2024. This update fixes several bugs, but more importantly, contains a fix for a serious security issue that is being exploited in the wild. This is your sign to enable Extended Protection, if you haven't already.
In this blog, Jon Jarvis reviews the importance of integrating devices with Intune, and the risks that can arise from poorly managed devices.
User consent is a great example of the tension between improved security and user convenience. Users want to be able to consent to applications without requiring the help of IT, which also allows the potential for a breach. In this blog, Paul reviews your options to solving the user consent problem.
This blog reviews the Midnight Blizzard Attack, providing some hypothetical scenarios of what actually happened and how it could've been prevented.
Unfortunately, attacks happen... But a post-attack investigation is paramount to stopping the next attack. In this blog, Paul Robichaux reviews what to do after an attack has taken place, with practical tips along the way.
Patching your systems manually can be complicated and require a lot of overhead. Luckily, Microsoft has a new solution to help with this. In this blog, Paul Robichaux reviews the new Windows Autopatch tool and what it has to offer.