Zero Trust

Security

How to Secure Sensitive Data in Microsoft 365

We’ve come a long way since those days and have seen technology evolve to support data stored in business cloud platforms such as Microsoft 365. In recent years, the digital revolution has made data more portable and more accessible, but crucially it has also made that data more vulnerable in many ways. Fortunately, if your organization...

Last Update: Oct 15, 2024

LATEST

Security

Five Tactics Towards Achieving Zero Trust with Microsoft Entra ID (Azure Active Directory)

Last Update: Jun 03, 2024

For any modern enterprise that uses Microsoft Entra ID (previously Azure Active Directory) to manage user and service access to cloud resources, it’s hard to escape the term Zero Trust (ZT), which implies that your organization must have a layered approach to security. In this article, you’ll learn about five Microsoft Zero Trust tactics for…

View Article
AirDroid Business enterprise and mobile device management

Securing Enterprise Devices: Embracing Zero Trust Security

Last Update: Apr 17, 2024

The excessive use of digital devices in enterprises and their exposure to various networks have increased the probability of cyber-attacks. Enterprise-owned devices contain confidential data that hackers can easily access if devices are not controlled efficiently, and that can cause damage to the values and reputation of the organizations. Thus, data security is now of…

View Article
Cloud Computing

Zero Trust: How Azure Active Directory and Identity Management Enable Cloud Security 

Last Update: Aug 29, 2023

After the successful SolarWinds attack in 2020 where attackers gained access to Microsoft’s systems, Microsoft changed its approach and aligned with the National Institute of Standards and Technology’s (NIST) zero trust architecture. In this article, we’re going to detail how Microsoft’s zero trust approach leverages Azure Active Directory and Identity and Access Management to enable cloud…

View Article
Network Security

What is a Software-Defined Perimeter?

A software-defined perimeter (SDP) is a modern network security framework for creating a virtual network perimeter to protect an organizational infrastructure from outsiders. In this article, I’ll explain how a software-defined perimeter works and what are the main use cases for this new computer security approach. With increasingly complex network and application security requirements, a…

View Article

Microsoft Zero Trust Solutions Help Drive 50% Lower Chance of Data Breach, Says New Research Study

Last Update: Sep 04, 2024

Microsoft has published a new study detailing the potential financial implications of implementing a Zero Trust architecture with its security solutions. The research study, dubbed Total Economic Impact, was released in December 2021 and highlighted the costs, benefits as well as risks associated with this investment. The research study was conducted by Forrester Consulting, a…

View Article

How to Enable Windows Hello for Business

Last Update: Sep 04, 2024

In this article, I’m going to show you how to enable Windows Hello for Business. You should enable Windows Hello for Business to reduce the risk associated with passwords. Even if your users’ devices don’t have hardware that supports Windows Hello, like a fingerprint reader, you can still have them use a PIN to login….

View Article

How to Join Windows 10 to Azure Active Directory

Last Update: Sep 04, 2024

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to join Windows 10 to Azure Active Directory. You will 1) join an existing Windows 10…

View Article

How to Register Windows 10 with Azure Active Directory

Last Update: Sep 04, 2024

Registering Windows 10 devices with an identity provider, like Azure Active Directory (recently renamed Microsoft Entra ID), is an important part of including endpoints in the Zero Trust security model. In this article, I’m going to show you how to register Windows 10 with Azure Active Directory. You will 1) register a Windows 10 device…

View Article

How to Deploy Zero Trust Identity Security

Last Update: Sep 04, 2024

This is the second article in the Zero Trust Security in Microsoft 365 series. Here you will gain an understanding of the strategies to deploy Zero Trust Identity Security. Managing identity will always be at the forefront of this security model. Environments with proper identity policies are better placed to handle attempts at gaining access…

View Article

Guide: Getting Started with Zero Trust Security in Microsoft 365

Last Update: Sep 04, 2024

Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…

View Article

Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers

Last Update: Sep 04, 2024

VPNs are commonly used to give users working from home access to corporate resources. But traditional forced tunnel VPNs can have a significant impact on the performance of cloud services like Office 365. In this article, I look at the different ways VPNs can be configured for performance and security.

View Article
Go to page