Multi Factor Authentication

Privileged Access Workstations: Securing Administrative Tasks

Privileged Access Workstations

Many companies are trying to better secure their administrative tools and sensitive data. Leveraging Privileged Access Workstations (PAW) is a good way to reduce the threat vector on these sensitive tasks and systems. PAW are separate client computing environments that can take advantage of added security measures like multifactor authentication (see our post on Six Design …

Privileged Access Workstations: Securing Administrative Tasks Read More »

Leveraging Microsoft’s Identity Management Platform to Secure Your Business

Avoid a tangled web of chaos by being intentional with your Identity Management

Over the past few weeks, we’ve covered a broad range of security-focused basics that you can implement to strengthen your security posture. Today, we’ll dive deeper into strengthening your security posture via the Microsoft’s Identity Management platform. As the Microsoft toolset used to manage Identity has evolved over the past few years, the ease of …

Leveraging Microsoft’s Identity Management Platform to Secure Your Business Read More »

Aligning Your Technical Design and Execution to Improve Your Security Posture

Improving your security posture

We continue our journey today on aligning technical design and execution in order to improve your security posture. This week, as I sat at dinner with a long-time IT friend, his phone rang. It was his sister. She works at a financial services organization and had not been to work all week. “We have been …

Aligning Your Technical Design and Execution to Improve Your Security Posture Read More »

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware

Protecting your data from ransomware starts with visibility of your data assets

A quick Google search on recent ransomware events will highlight the sad state of our current world. Our data has monetary value. Those who can hold it hostage are able to extract a financial sum for its (supposed) return. Managing your data assets properly is becoming a vital skill. Unfortunately, protecting your data from ransomware …

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware Read More »

Six Things to Consider when Deploying MFA

MFA deployment

Like many things in tech, the consumer experience drives corporate adoption. Well, in the case of Multi Factor Authentication, we, as individual consumers, have seen the place text message verifications, phone prompts, and IP-based tracking provides a layer of validation in our personal banking, email accounts, and mobile entertainment applications.   This experience has prepared users …

Six Things to Consider when Deploying MFA Read More »