Data Breach: A 5-Step Response Plan

Data Breach: A 5-Step Response Plan https://ift.tt/xMqLucj Introduction A data breach is one of the worst scenarios in today’s enterprise security, and for good reason. It entails reputational problems, disruption of business processes, and penalties for noncompliance with increasingly rigid data protection laws. Unfortunately, these incidents are steadily gearing up for a rise. Even ransomware […]

New VMware Community HCL

New VMware Community HCL https://ift.tt/y8hs3Ma If you are not using or can not use the official VMware Hardware Compatibility List (HCL) to identify hardware systems and components that are officially supported with a given version of vSphere ESXi, then the experience in finding hardware can be quite daunting for both new and even existing users. […]

Protecting Administrator Mailboxes from Phishing and Other Threats

Protecting Administrator Mailboxes from Phishing and Other Threats https://ift.tt/A3Xlc8h Separation of Responsibilities is a Good Thing In his article describing why separate Microsoft 365 administrator accounts are critical to security posture, Thijs Lecomte outlines reasons why the accounts used to perform Microsoft 365 administrative operations should not be used for day-to-day activities such as email […]

Azure AD access reviews basics

Azure AD access reviews basics https://ift.tt/Ck1RyHo Azure AD reviews are a capability provided with Azure AD P2 licenses that allow you to automate the discovery and access control of user account in Azure AD groups and roles. This video give you a walk through of the basics of creating and using access reviews to ensure […]

Azure AD Identity Protection basics

Azure AD Identity Protection basics https://ift.tt/eUGVowQ Azure AD Identity protection is available with Azure AD P2 and provides risk detection and policy enforcement for sign ins and users. It can also be incorporated with Conditional Access policies to provide even more flexibility. This video shows you the basics of Azure AD Identity Protection as well […]

TLS certificate changes to Microsoft 365 services including Microsoft Teams

TLS certificate changes to Microsoft 365 services including Microsoft Teams https://ift.tt/LnhrfD5 Microsoft 365 is updating services powering messaging, meetings, telephony, voice, and video to use TLS certificates from a different set of Root Certificate Authorities (CAs). This change is being made because the current Root CA will expire in May 2025. Affected products include: Microsoft […]