Security

LATEST

Security

Microsoft Authenticator to Enable Number Matching Security Feature by Default in February 2023

Last month, Microsoft introduced support for number matching to its Authenticator app. The company has announced on the Microsoft 365 admin center that the new security feature will be enabled by default for all Microsoft Authenticator users worldwide in February 2023. With number matching enabled, the Microsoft Authenticator app requires users to type a number…

View Article

Use a Local Administrator Account for Remote Administration

Last Update: Nov 14, 2022

LAPS-managed local administrator accounts can be used for remote administration providing that policy doesn’t block their use.

View Article
Security

How to Install and Configure Microsoft LAPS

Last Update: Nov 14, 2022

Configure Microsoft’s new Local Administrator Password Solution (LAPS) tool to protected local administrator accounts.

View Article
Network Security

What is a Software-Defined Perimeter?

A software-defined perimeter (SDP) is a modern network security framework for creating a virtual network perimeter to protect an organizational infrastructure from outsiders. In this article, I’ll explain how a software-defined perimeter works and what are the main use cases for this new computer security approach. With increasingly complex network and application security requirements, a…

View Article
Cloud Computing

Microsoft Defender for Endpoint Adds Network Protection on iOS and Android

Microsoft has announced that mobile network protection is now generally available in Defender for Endpoint. The feature first launched in public preview back in July to help organizations protect iOS and Android devices against Wi-Fi-related threats in enterprise networks. “As the world continues to make sense of the digital transformation, networks are becoming increasingly complex…

View Article

Choosing between Virtual Private Network and Zero Trust Remote Access Solutions

Last Update: Nov 11, 2022

As we enter a time of crisis that will see a significant number of employees asked to work from home, organizations need to provide effective but secure remote access to corporate resources. The tried and tested virtual private network (VPN) might seem like the obvious choice. But so called ‘zero trust’ is gaining popularity and could surpass traditional VPN access.

View Article
Security

Microsoft Defender for Business Adds Server Protections for SMBs

Microsoft launched a preview of new server protection capabilities in its Defender for Business solution back in July. The company announced this week that this feature is now generally available to help small businesses protect Windows and Linux servers. Microsoft Defender for Business is an endpoint security solution for small and medium-sized businesses (SMBs) with…

View Article
Security

Why You Need to Create an Incident Response Plan

To effectively handle various types of security break-ins, many organizations have created an incident response (IR) plan. In this article, I’ll explain what is an incident response plan, how it differs from a disaster recovery plan, and what steps you need to follow to create an effective IR plan for your organization. While most businesses…

View Article
Security

Microsoft Defender Vulnerability Management Now Detects OpenSSL 3.0 Vulnerabilities

Last week, the OpenSSL team patched two high-severity security vulnerabilities in its open-source cryptography tool. Microsoft announced yesterday that organizations can use Defender Vulnerability Management to detect vulnerable devices in their organization and monitor their patching process to reduce security threats. OpenSSL is a popular cryptography library that provides open-source implementations of both SSL and…

View Article
Security

Microsoft Warns Attackers Now Leveraging Raspberry Robin to Distribute Clop Ransomware

Microsoft has warned users that threat actors have deployed a Clop encryption malware to encrypt enterprise networks affected by the Raspberry Robin worm. The company detailed in a security advisory that the payload had infected around 3,000 devices in 1,000 organizations in the last month. Security firm Red Canary first discovered the Raspberry Robin worm…

View Article
Go to page