Data Protection

Privileged Access Workstations: Securing Administrative Tasks

Privileged Access Workstations

Many companies are trying to better secure their administrative tools and sensitive data. Leveraging Privileged Access Workstations (PAW) is a good way to reduce the threat vector on these sensitive tasks and systems. PAW are separate client computing environments that can take advantage of added security measures like multifactor authentication (see our post on Six Design …

Privileged Access Workstations: Securing Administrative Tasks Read More »

Exploring a NAC Maturity Model

Network Access Control

As our current technical service models stabilize during this work from home transition, we’ll take a minute to visit strategies for improving our user experience for the future return of employees to the office. Today, we explore a Network Access Control (NAC) maturity model and the maturation of the deployment within our ecosystems. NAC Maturity …

Exploring a NAC Maturity Model Read More »

Leveraging Microsoft’s Identity Management Platform to Secure Your Business

Avoid a tangled web of chaos by being intentional with your Identity Management

Over the past few weeks, we’ve covered a broad range of security-focused basics that you can implement to strengthen your security posture. Today, we’ll dive deeper into strengthening your security posture via the Microsoft’s Identity Management platform. As the Microsoft toolset used to manage Identity has evolved over the past few years, the ease of …

Leveraging Microsoft’s Identity Management Platform to Secure Your Business Read More »

Aligning Your Technical Design and Execution to Improve Your Security Posture

Improving your security posture

We continue our journey today on aligning technical design and execution in order to improve your security posture. This week, as I sat at dinner with a long-time IT friend, his phone rang. It was his sister. She works at a financial services organization and had not been to work all week. “We have been …

Aligning Your Technical Design and Execution to Improve Your Security Posture Read More »

The Advantages of Leveraging a Cloud-Based Data Management Strategy 

The technical advantages of leveraging a cloud-based data management strategy

Why Cloud Makes Sense for Data Management  Today’s cloud landscape continues to offer new opportunities for organizations to deliver enterprise services in new and advantageous ways. In Four Simple Methodologies to Modernizing Your Data Management Strategy, we discussed the importance of leveraging solutions that have intentional, cloud native integrations. A cloud-based data management strategy has many advantages. Below, we will work to highlight …

The Advantages of Leveraging a Cloud-Based Data Management Strategy  Read More »

Four Simple Methodologies to Modernizing Your Data Management Strategy

In today’s multi-cloud world, we’re often faced with the tough decisions of creating a long-term strategy fit within existing architectural decisions. How do we properly evaluate the best options that fit within our strategic goals? Sometimes this is easier said than done. It’s also important to realize that infrastructure modernization becomes an important part of …

Four Simple Methodologies to Modernizing Your Data Management Strategy Read More »

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware

Protecting your data from ransomware starts with visibility of your data assets

A quick Google search on recent ransomware events will highlight the sad state of our current world. Our data has monetary value. Those who can hold it hostage are able to extract a financial sum for its (supposed) return. Managing your data assets properly is becoming a vital skill. Unfortunately, protecting your data from ransomware …

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware Read More »