Author Archives: Bally

GDPR Deadline is Here, Fulfill your Needs with Microsoft Compliance

Microsoft’s Top 10 Areas of Compliance

GDPR Deadline is Here, Fulfill your Needs with Microsoft Compliance  Microsoft 365 has a multitude of features to help you navigate your industry’s compliance standards, along with federal and global regulatory compliance requirements.  Compliance is among the toughest challenges for businesses in the digital age. Aside from existing federal and… Read more »

2018 Top 5 Cyber Security Predictions: Attacks, Regulations and Innovation

We’re about mid-way through January of 2018, which means that it’s about time I follow up on my new tradition of sharing my top cyber security predictions of the new year! Check out last year’s predictions. The Big Four: 2017 Cyber Security Predictions   This year, in many ways, shares… Read more »

Securing your business with Advanced Threat Protection (ATP)

Advanced Threat Protection

Securing your business with Advanced Threat Protection (ATP) Microsoft 365’s Advanced Threat Protection protects businesses against malicious attacks, abnormal behavior, and other security risks. Learn how to leverage ATP for your, and your customers’, businesses. Enterprise-level security is becoming a top priority for every successful business. As we witness staggering… Read more »

Leverage the full ease and security of Azure Information Protection

Azure Information Protection

Leverage the full ease and security of Azure Information Protection Keeping all your company’s data labeled according to policy with full visibility and control into how that data can be used is a daunting task. However, with Azure Information Protection, administrators have easy access to labeling, classifying and action controls,… Read more »

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Securing Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility + Security… Read more »

Have I been Breached? 4 Signs to know when your Business is under Attack

have i been breached

Have I been Breached? 4 Signs to know when your Business is under Attack There is one major difference between how cyber security experts and everyone else think about cyber security: our expectations. While most people don’t assume there is an issue until one is presented to them, security experts… Read more »

The Cloud Security Landscape

cloud security landscape

The Cloud Security Landscape At this point, you’ve definitely heard of the cloud. Everyone, especially businesses, is talking about moving to the cloud, and their concerns about the cloud security landscape. You already use cloud-based services such as Netflix, Spotify, and Amazon. However, like with most technologies, innovation precedes security,… Read more »

New FTC and IRS Scams to look out for

Summer Scams

New FTC and IRS Scams to look out for The FTC and IRS recently announced some summer scams which have been reported and what you can do to avoid and react to such events. Below we will outline each one and provide resources to ensure it doesn’t happen to you,… Read more »

WannaCry Ransomware Roundup

WannaCry ransomware

WannaCry Ransomware Roundup On May 12, 2017, a new ransomware strain, deemed “WannaCry” (WannaCrypt), was found by Malwarebytes (an anti-malware software company). Programmed to run in 27 languages, the ransomware’s first major infection, which grabbed all our attention, was when it hit the National Health Service of Britain (NHS). British… Read more »

Am I being hacked? 4 ways to tell if your system’s been compromised

am I being hacked

  Am I being hacked? 4 ways to tell if your system’s been compromised How do you tell if your computer or accounts have been hacked? Below are four, easy ways to tell if your system and/or accounts have been compromised. If you suspect your system or accounts are under… Read more »