Thoughts From Our Staff

Browse By Category

Featured Articles

The Complete Office 365 and Microsoft 365 Licensing Comparison

The Complete Office 365 and Microsoft 365 Licensing Comparison

  I've only met one other person that could write the complete Office 365 and Microsoft 365 licensing comparison. That person is Glenton Davis, Sr. Product Marketing Manager at Microsoft. (Although, I did stump him on a few CAS unified...
Budgeting for Microsoft Defender XDR and Zero Trust Security

Budgeting for Microsoft Defender XDR and Zero Trust Security

Building a Zero Trust Security framework with 20+ vendors has zero chance of success. This is why budgeting for Microsoft Defender XDR for Zero Trust Security must be at the forefront of a modern cybersecurity strategy for organizations of any...
Microsoft Defender For Endpoint Standalone is Now Available! (Formerly MD ATP)

Microsoft Defender For Endpoint Standalone is Now Available! (Formerly MD ATP)

Note: Microsoft Defender Advanced Threat Protection (MD ATP) Is Now Defender For Endpoint Update: As of August 2021, MDE P1 is also available bundled in Microsoft 365 E3/A3. Only two years overdue, Microsoft Defender for Endpoint standalone is now available!...

Featured Articles

Recent Posts

MicrosoftTeams-image-6

Accessibility in Microsoft 365

Today’s companies have diversities of all kinds—not just race and gender but age and ability as well. Everyone should have the opportunity to do their best work, regardless of their particular abilities and challenges. Infused Innovations is committed to helping users of all capabilities achieve more and be more productive. We see this as part…

Screen-Shot-2020-07-05-at-9.41.16-AM

Fake Bosses, COVID-19, and Darth Vader: Interns Learn to Safeguard Against Every Threat

“Safeguard against every threat…” It’s what the CEO advised our five-year-old interns Joey and Walt to do. In the past several weeks they’ve learned a great deal, all while working from home under COVID-19. If you haven’t checked out this cute video series, you can watch their adventures on our YouTube page. Here we’ll go…

Business woman having a video call with coworker, working online from home at cozy atmosphere. Concept of remote work from home

Telephone Plans in Microsoft Teams

If you’re familiar with Microsoft Teams, you probably know it as a hub for communication and collaboration within the workplace. It serves as a convenient place to do group or individual chat, calling, and file sharing. But Teams offers even more than that. It’s also a good platform for education and distance learning, and even…

Canva-Neon-Projection-of-the-American-Flag-scaled

Responsible AI for Responsible Democracy

Imagine for a moment, as you may have already done at some point, this scenario: artificial intelligence has reached a level of sophistication where it can manipulate and oppress human beings, interfere with democratic elections, spread false and distorted information, and promote its own advancement at the expense of those in weaker positions. Now, erase…

giacomo-carra-gf6UDwpl0ac-unsplash-scaled

Using Power BI to Analyze COVID-19

Microsoft’s Power BI—short for Business Intelligence—is often used to drive business decisions and strategies through graphs and other interactive visualizations. These applications include forecasting sales, expenses, hiring, etc. In working with Power BI, I’ve come to realize that while this tool is remarkably helpful, its use tends to be limited to these specialized business spheres.…

Screen-Shot-2020-05-30-at-1.03.15-PM

Microsoft Tools Every Intern Should Know About

Here at Infused Innovations we have a couple new interns, and…well, they’ve got a lot to learn. Walt and Joey are only five years old, though, so we’ll cut them some slack. They’ve actually been doing fabulously in our short-clip video series designed to inform others of some resources every intern should know about. We…

360-degree-customer-view

How Well Do You Know Your Customers? Gain a 360-Degree Customer View

If you run a business that relies on customer loyalty, you know how important your customer data is. You may be running a customer relationship management (CRM) solution to keep track of your customers’ experiences with your company. But in many cases, the separate elements of this data are kept in “silos” that make a…

II-Large-BW

Statement from our CEO: We Stand With Those Calling for Justice, Equality, and True Democracy

The events of the past several days have made us at Infused Innovations question whether we can continue doing our jobs in information security and AI without addressing the social vulnerabilities that have increasingly been exposed in our nation and our world. The answer is: no, we cannot. What we stand for—responsible innovation, global sustainability,…

windows-10

Updates in Windows 10 version 2004

Microsoft has put forth its Windows 10 version 2004 update, or its Spring 2020 release. (The number 2004 refers to 2020 April—even though it was released in May. Microsoft notes that it chose to use 04 over 03 in order to avoid confusion with the year 2003. Still confused? The first two digits refer to…

Azure-Governance

Top 10 Security Best Practices for Azure in 2021

Threat landscapes are constantly evolving. There are new AI & ML products on the market to address these constantly evolving threats. Let’s start with the basics and make sure the front door is locked. Here are the top 10 security best practices for Azure that we deploy for every client at Infused Innovations. 1. Create…

Microsoft-Build-2020-COVID-19

Top Microsoft Build 2020 Announcements

We love it when a big tech conference rolls around with exciting new announcements. (See our write-ups on Microsoft Ignite and RSA!) This one, Microsoft Build 2020, is especially interesting because of our current situation. In the last two months, the COVID-19 pandemic has spurred as much digital transformation as we might otherwise expect in…

Teams-in-edu-at-home

Microsoft Teams for Education

Raise your hand if you’ve been frustrated with the distance learning platforms your child uses for school at home. If we were on a Zoom call, I think we’d see nearly everyone raising their hand (the kids included). And that’s not mentioning higher education, where college students and university professors often feel like they’re grasping…

azure_activedirectory-ZERO-TRUST

A Zero Trust Guide for Azure AD

In today’s digital world—especially with the additional remote work taking place under shelter-at-home practices—it’s crucial to have a strong security framework. We’ve discussed before how a Zero Trust policy provides solid protection against attacks. But implementing this practice does take extra work. Let’s go over some guidelines that can help get you started with this…

Microsoft-SpringReleases

Microsoft Spring Releases: Work Anywhere, Secure Everywhere

For those working in information technology and security, it’s always exciting to see what new products and improvements are being released. Now more than ever, under novel circumstances with so many employees working from home, many of us are anxious to see what these latest releases can offer to help us navigate remote work smoothly…

security-poverty-1

Security Poverty Lines

When we think of the term “security poverty lines,” we rarely think of organizations’ abilities to maintain good hardware and cybersecurity. Yet this is a largely unrecognized problem for many of today’s companies. In a podcast on Security Nation, head of of advisory CISO services at Duo Security Wendy Nather discusses the problem of the…

File-drawers

Addressing Common Concerns of File Integrity Monitoring

There are some common concerns of File Integrity Monitoring that are worth addressing. Also called change monitoring, FIM is a security technique that uses a known baseline as a measure for verifying the current safety of an operating system and its software. Basically, it defines a safe “normal” and gauges current activity based on whether…

robot-ai-medicine-health

The Future is Now: How AI and Robotics Can Help Fight Disease

Most people think that technologies like AI, drones, and robots are years away from really becoming usable. We’ve been seeing them in sci-fi movies and imaginative fiction for a while now, but for the most part these robotics still seem to have a futuristic feel to them. What many people don’t realize, though, is that…

Zoom-Screenshot

Using Zoom? You Just Failed Your Compliance Audit

Have you been on a Zoom group call recently? I have—not for work, but my kids’ school class has done online show-and-tell over Zoom, and my extended family has organized virtual gatherings with it. Schools and universities use it as their go-to platform for online teaching. Friends are using it for happy hour meetups. And,…

Magic-Quadrant-Microsoft

Teams and OneDrive keep Microsoft at the Top of Gartner’s Magic Quadrant

Seeing Microsoft at the top of Gartner’s Magic Quadrant isn’t surprising. Microsoft was a leader for Gartner’s Unified Endpoint Management (UEM) evaluation last summer. And in the fall, it came out on top once again for the Magic Quadrant on Content Services Platforms. We cited Microsoft 365 and Intune as key components driving Microsoft’s achievement…

M365-compliance-center-screenshot

Microsoft 365 Compliance Center Addresses New Privacy Regulations

In 2018, the European Union enacted the General Data Protection Regulation (GDPR), the first major policy protecting consumer data. That spearheaded greater attention and concern over the issue of data privacy, and other places around the globe have since followed the EU’s lead. The state of California is one of those places, having recently instituted its…

thought-catalog-Nv-vx3kUR2A-unsplash-scaled

Pros and Cons of the Zero Trust Model

The Zero Trust model is a security framework that operates like its name suggests: it follows the policy of trusting no one, including those within the network. Every entity (inside or outside the network) is assumed to be a potential threat and should not be considered safe until it is checked and verified. Thus, every…

work-from-home-in-bed

Work From Home to Reduce your Exposure to COVID-19

As the novel Coronavirus continues to spread, we’re hearing this advice more and more: work from home to avoid spreading COVID-19. Just a month after it was first detected in China, the World Health Organization declared COVID-19 a public health emergency of international concern on January 30. According to the Centers for Disease Control and…

Ransomware-graphic

Why Ransomware Is Still a Problem

  There’s a misconception out there that ransomware is declining and becoming a threat of the past. This assumption can be dangerous, though, because it’s not accurate—as our own interns have learned. Ransomware attacks did decline over the course of 2018, but that lull didn’t end up being a continuous trend. Increased ransomware attacks and…

RE4FlcI

Microsoft Defender For Endpoint Standalone is Now Available! (Formerly MD ATP)

Note: Microsoft Defender Advanced Threat Protection (MD ATP) Is Now Defender For Endpoint Update: As of August 2021, MDE P1 is also available bundled in Microsoft 365 E3/A3. Only two years overdue, Microsoft Defender for Endpoint standalone is now available! Since announcing Microsoft Defender for Endpoint for MacOS and Linux last year, Microsoft was still…

Microsoft-envrionment

Microsoft Plans to be Carbon Negative by 2030

Scientists have overwhelmingly shown that our climate is warming and that human-related carbon emissions are a cause of it. But with some politicians and leaders still denying these realities, who will stand up for the facts? How can change be enacted to correct this massive issue? Thankfully, Microsoft is willing to take leadership not only…

RSA-San-Francisco

Top Announcements at RSA 2020

Life is buzzing in San Francisco and the RSA conference is in full swing! RSA is an annual data security conference that’s big news for IT and security folks. We gave you the inside scoop on Microsoft’s top RSA announcements at this year’s conference. Now let’s see what other tech companies have to present to…

Microsoft-SOC-scaled

Top Microsoft Announcements at RSA 2020

The security-centric RSA Conference kicks off this week in San Francisco. Following the conference news is a great way to stay updated about the latest security developments being offered in technology. Let’s take a look at the exciting top Microsoft announcements at RSA 2020. Note: RSA was just purchased by the Symphony Technology Group last…

gdpr_compliance

Data Privacy is Good Global Citizenship

Privacy is one of the big issues to consider in our digital world. Did you know there’s even a Data Privacy Day? It’s been around since the European Union set it for recognition back in 2007, with the U.S. jumping onboard in 2008. Those of us who are particularly concerned with the issue of privacy…

flattering-flag-of-united-states-of-america-4386429-scaled

10 Ways to Use Microsoft 365 for Campaigns in 2020

As we near this year’s U.S. presidential election, one big concern on people’s minds is whether the process will be secure and free from outside interference. Microsoft has responded to this concern with its Defending Democracy Program, its most recent development being Microsoft 365 for Campaigns. This is a simple and powerful service meant for…

BusinessLeadership_AIHumanTouch_PH1

Step-by-Step Guide to Build, Train & Deploy ML Models with Custom Vision

Artificial Intelligence (AI) and Machine Learning (ML) are more than just buzzwords. Every day these technologies fuel advancements that impact our lives, optimize and automate operations, and help make business decisions—especially under the threat of COVID-19. Azure Cognitive Services allows developers to transparently build AI and ML into their applications. In this article, I am…

Graphic displays the flow of a phishing campaign attack.

Microsoft Adds Campaign Views in Office 365 ATP Stack

Microsoft’s Office 365 Advanced Threat Protection (ATP) is a robust anti-malware and virus email filtering service. With the addition of its new feature campaign views in Office 365 ATP, it just got even stronger. Now ATP can follow patterns and crafted templates to detect attacks that make use of a larger strategic plan, rather than…

nsa

NSA Reports a Critical Windows Vulnerability

The NSA Reports a Critical Windows Vulnerability warning of a critical vulnerability in Microsoft Windows’ cryptographic functionality. This is the first time that the National Security Agency has publicly taken credit for the discovery of a vulnerability, and it urges users to patch their systems immediately. The NSA report, released on January 14, says that…

AdobeStock_335900215-scaled

AccountGuard and Microsoft Security for Political Campaigns in 2020

If you’re like any of the other 250 million adults in the U.S., you’re probably worried about political campaign interference. This is a concern that transcends party lines and business categories. And with today’s technologies and cyber capabilities, it’s a dangerous reality. It is widely known that Russian hackers interfered with the 2016 U.S. presidential…

windows-10-defenses-petya-e1578020813859

Top 3 Anti-Ransomware Guards for Windows 10 in 2020

Ransomware attacks are increasing exponentially. Infused Innovations sees this trend continuing into 2020 and we want to share a few ways that we protect our clients. The three anti-ransomware guards for Windows 10 that we’ll look at today are: Windows Defender Credential Guard Windows Defender System Guard Controlled Folder Access I’ve selected these three tools…

Enterprise-Security-Magazine-top-10-scaled

Infused Innovations Named Top 10 Security Provider in 2019

FOR IMMEDIATE RELEASE Infused Innovations Named Top 10 Security Provider in 2019 by Enterprise Security Magazine Infused Innovations (401) 267-4460 [email protected]   Enterprise Security magazine published their list of the top 10 security automation providers in 2019 and Infused Innovations is excited to be at the top of the list.  With the ever-increasing risk for cyber-attacks, organizations are now relying on security automation solution…

california-flag

California Consumer Privacy Act Goes into Effect January 1, 2020

With the advancement of technology and the digital nature of our lives today, privacy has become a pressing issue. Consumers want to know that their private information and data are safe. Despite this growing concern, the U.S. Congress has failed to take legislative measures protecting privacy. But California has stepped forward and addressed the concern…

Melissa

Infused Innovations Is Excited To Announce New Director Of Marketing

FOR IMMEDIATE RELEASE Infused Innovations is Excited to Announce New Director of Marketing Infused Innovations (401) 267-4460 [email protected]   North Kingstown, RI: On Monday, Infused Innovations formally announced the promotion of Melissa Crouch to Director of Marketing. Located in San Diego, CA, we are excited to welcome her as our newest member of the west coast team and leader of our Women…

Azure_Arc_Infographic

Microsoft’s Azure Arc

One of the big announcements that Microsoft made at its Ignite conference this year was about Azure Arc, which allows you to use Azure capabilities across clouds, platforms, and locations. As a presenter at the conference put it, “Azure truly is the world’s computer,” and many are already calling Azure Arc a game-changer. So what…

Microsoft-Cybersecurity-Framework-scaled

Infused Innovations Earns the Microsoft Security Competency

The Microsoft Security competency has been awarded to Infused Innovations for their recently announced Intelligent Threat Protection service. ITP is a security orchestration, automation, and response service that sits on top of the Microsoft security stack, and includes other strategic partnerships such as Jamf and KnowBe4. By earning this Security competency, which Microsoft also recently…

Passwordless-Path

Get Your Organization Ready to Leave Passwords Behind

So many passwords, such a headache and waste of keystrokes…I’m ready to drop these things completely. Chances are, you or your employees have felt this way to one extent or another. If you are a CISO or security manager, you’ve probably gone even further and thought to yourself: there’s got to be a more secure…

Microsoft-cyber-crime

Infused Innovations Launches Managed Infused Threat Protection

Infused Innovations is announcing their new managed Infused Threat Protection (ITP) service that is replacing their Secqur Aether platform. Along with the rebrand, Infused Innovations is adding the recently released Microsoft Azure Sentinel service to their arsenal. Azure Sentinel provides a cloud-native security information event management (SIEM) and security orchestration automation and response (SOAR) solution…

Identity_diagram

Start Moving to Modern Authentication

Microsoft has announced that it will end support for Basic Authentication in Exchange Online next year, on October 13, 2020. Various protocols will change their authentication methods, including Exchange Active Sync (EAS), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), and Remote PowerShell (RPS) in Exchange Online. Applications that use any of these APIs/protocols will be…

IncidentResponse

Writing an Effective Security Incident Response Procedure

If you’re a chief information security officer, you need to write security incident response procedure documents (I’ll call them SIRPdocs). And your job can depend on the ability to write them well—Gartner suggests that up to 75% of CISOs who suffered publicly documented security breaches without well-tested security plans may have lost their jobs in…

PowerAutomate-Workflow

Microsoft Flow is Now Power Automate

Automation is a big topic today in the tech world. If you’ve heard of Microsoft Flow, that may be thanks to its robotic process automation (RPA) capabilities and how it can connect legacy and modern applications within a business. As announced at the Ignite conference 2019, Microsoft Flow is now called Power Automate, in line…

WVD-Services-Diagram

Step-by-Step Guide to Install FSLogix on WVD

With the recent GA of Windows Virtual Desktop (WVD) Microsoft has extended its ability to deliver important endpoint capabilities to users anywhere in the world. Designed to improve upon the standard Windows Virtual Desktop capabilities, installing FSLogix on WVD can enhance and simplify these sorts of non-persistent environments. Benefits of Installing FSLogix on WVD Maintain…

BT_NonProfit_Disability

Microsoft 365 Plans for Non-Profits

Non-profit organizations often underestimate their risk of cyber attacks. This leaves them more vulnerable than they realize and oftentimes an easier target than other kinds of companies. Yet failing to prioritize cybersecurity could have major effects—data losses, financial catastrophe, damaged reputation or even the need to shut down the organization altogether. Studies show that non-profits…

Microsoft-Ignite_

Microsoft Ignite 2019’s Top Announcements

Microsoft Ignite is the annual conference where the tech giant gets to show off its exciting new developments. The company’s many announcements are of interest to IT professionals, developers, and big Microsoft fans. We love hearing about new streamlined improvements and innovative previews offered. This year’s conference seemed to present more news than ever—Microsoft provided…

Autopilot

Windows Autopilot for Workstation Imaging

The typical process of acquiring new devices and configuring them for company use is a bit of a headache. It goes something like this: your IT admin gets the devices, wipes them of their default settings, re-images them with custom images using Ghost or Acronis, obtains drivers, configures the relevant applications and settings, and finally…

Bluekeep

PSA: Patch BlueKeep and DejaBlue Now

Microsoft issued two of the same warnings to its users this year: patch BlueKeep and DejaBlue on your vulnerable Windows systems. When the first and then the second warning went largely unheeded, the National Security Agency (NSA) published a rare advisory on June 4 urging Microsoft Windows administrators to update their operating systems. An NSA warning of…

Intune-MAM-Diagram

MAM and Intune: Sandboxing Corporate Data

In line with all of Microsoft’s products, Intune is designed to deliver top security for corporate data while optimizing user productivity. In this case, we’re focusing specifically on mobile devices and their apps. Intune is Microsoft’s Enterprise Mobility + Security (EMS) component that manages that area. Let’s take a look at the difference between mobile…