Thoughts From Our Staff

Browse By Category

Featured Articles

The Complete Office 365 and Microsoft 365 Licensing Comparison

The Complete Office 365 and Microsoft 365 Licensing Comparison

  I've only met one other person that could write the complete Office 365 and Microsoft 365 licensing comparison. That person is Glenton Davis, Sr. Product Marketing Manager at Microsoft. (Although, I did stump him on a few CAS unified...
Budgeting for Microsoft Defender XDR and Zero Trust Security

Budgeting for Microsoft Defender XDR and Zero Trust Security

Building a Zero Trust Security framework with 20+ vendors has zero chance of success. This is why budgeting for Microsoft Defender XDR for Zero Trust Security must be at the forefront of a modern cybersecurity strategy for organizations of any...
Microsoft Defender ATP Standalone is Now Available!

Microsoft Defender ATP Standalone is Now Available!

Product is now named: Microsoft Defender for Endpoint. Only two years overdue, Microsoft Defender ATP standalone is now available! Since announcing Microsoft Defender Advanced Threat Protection for MacOS and Linux last year, Microsoft was still requiring customers to purchase a...

Featured Articles

Blog 3 I’ve only met one other person that could write the complete Office 365 and Microsoft 365 licensing comparison. That person is Glenton Davis, Sr. Product Marketing Manager at Microsoft. (Although, I did stump him on a few CAS unified labeling features…after he schooled me about the new Microsoft 365 Security E5 plan.) To put it another way: Microsoft subscriptions are confusing. The Complete Office 365 and Microsoft 365 Licensing Comparison Read More Blog 4 Budgeting for Microsoft Defender XDR and Zero Trust Security Building a Zero Trust Security framework with 20+ vendors has zero chance of success. This is why budgeting for Microsoft Defender XDR for Zero Trust Security must be at the forefront of a modern cybersecurity strategy for organizations of any size that are running Microsoft Windows or Office 365. Read More Blog 5 Only two years overdue, Microsoft Defender ATP standalone is now available! Since announcing Microsoft Defender Advanced Threat Protection for MacOS and Linux last year, Microsoft was still requiring customers to purchase a Windows 10 E5 license if they wanted access to MD ATP. But that is changing this month, now that a standalone MDATP SKU has been made available! Microsoft Defender ATP

Standalone is Now Available!
Read More

Recent Posts

RSA-San-Francisco

Top Announcements at RSA 2020

Life is buzzing in San Francisco and the RSA conference is in full swing! RSA is an annual data security conference that’s big news for IT and security folks. We gave you the inside scoop on Microsoft’s top RSA announcements at this year’s conference. Now let’s see what other tech companies have to present to…

Microsoft-SOC-scaled

Top Microsoft Announcements at RSA 2020

The security-centric RSA Conference kicks off this week in San Francisco. Following the conference news is a great way to stay updated about the latest security developments being offered in technology. Let’s take a look at the exciting top Microsoft announcements at RSA 2020. Note: RSA was just purchased by the Symphony Technology Group last…

gdpr_compliance

Data Privacy is Good Global Citizenship

Privacy is one of the big issues to consider in our digital world. Did you know there’s even a Data Privacy Day? It’s been around since the European Union set it for recognition back in 2007, with the U.S. jumping onboard in 2008. Those of us who are particularly concerned with the issue of privacy…

flattering-flag-of-united-states-of-america-4386429-scaled

10 Ways to Use Microsoft 365 for Campaigns in 2020

As we near this year’s U.S. presidential election, one big concern on people’s minds is whether the process will be secure and free from outside interference. Microsoft has responded to this concern with its Defending Democracy Program, its most recent development being Microsoft 365 for Campaigns. This is a simple and powerful service meant for…

BusinessLeadership_AIHumanTouch_PH1

Step-by-Step Guide to Build, Train & Deploy ML Models with Custom Vision

Artificial Intelligence (AI) and Machine Learning (ML) are more than just buzzwords. Every day these technologies fuel advancements that impact our lives, optimize and automate operations, and help make business decisions—especially under the threat of COVID-19. Azure Cognitive Services allows developers to transparently build AI and ML into their applications. In this article, I am…

Graphic displays the flow of a phishing campaign attack.

Microsoft Adds Campaign Views in Office 365 ATP Stack

Microsoft’s Office 365 Advanced Threat Protection (ATP) is a robust anti-malware and virus email filtering service. With the addition of its new feature campaign views in Office 365 ATP, it just got even stronger. Now ATP can follow patterns and crafted templates to detect attacks that make use of a larger strategic plan, rather than…

nsa

NSA Reports a Critical Windows Vulnerability

The NSA Reports a Critical Windows Vulnerability warning of a critical vulnerability in Microsoft Windows’ cryptographic functionality. This is the first time that the National Security Agency has publicly taken credit for the discovery of a vulnerability, and it urges users to patch their systems immediately. The NSA report, released on January 14, says that…

AdobeStock_335900215-scaled

AccountGuard and Microsoft Security for Political Campaigns in 2020

If you’re like any of the other 250 million adults in the U.S., you’re probably worried about political campaign interference. This is a concern that transcends party lines and business categories. And with today’s technologies and cyber capabilities, it’s a dangerous reality. It is widely known that Russian hackers interfered with the 2016 U.S. presidential…

windows-10-defenses-petya-e1578020813859

Top 3 Anti-Ransomware Guards for Windows 10 in 2020

Ransomware attacks are increasing exponentially. Infused Innovations sees this trend continuing into 2020 and we want to share a few ways that we protect our clients. The three anti-ransomware guards for Windows 10 that we’ll look at today are: Windows Defender Credential Guard Windows Defender System Guard Controlled Folder Access I’ve selected these three tools…

Enterprise-Security-Magazine-top-10-scaled

Infused Innovations Named Top 10 Security Provider in 2019

FOR IMMEDIATE RELEASE Infused Innovations Named Top 10 Security Provider in 2019 by Enterprise Security Magazine Infused Innovations (401) 267-4460 [email protected]   Enterprise Security magazine published their list of the top 10 security automation providers in 2019 and Infused Innovations is excited to be at the top of the list.  With the ever-increasing risk for cyber-attacks, organizations are now relying on security automation solution…

california-flag

California Consumer Privacy Act Goes into Effect January 1, 2020

With the advancement of technology and the digital nature of our lives today, privacy has become a pressing issue. Consumers want to know that their private information and data are safe. Despite this growing concern, the U.S. Congress has failed to take legislative measures protecting privacy. But California has stepped forward and addressed the concern…

Melissa

Infused Innovations Is Excited To Announce New Director Of Marketing

FOR IMMEDIATE RELEASE Infused Innovations is Excited to Announce New Director of Marketing Infused Innovations (401) 267-4460 [email protected]   North Kingstown, RI: On Monday, Infused Innovations formally announced the promotion of Melissa Crouch to Director of Marketing. Located in San Diego, CA, we are excited to welcome her as our newest member of the west coast team and leader of our Women…

Azure_Arc_Infographic

Microsoft’s Azure Arc

One of the big announcements that Microsoft made at its Ignite conference this year was about Azure Arc, which allows you to use Azure capabilities across clouds, platforms, and locations. As a presenter at the conference put it, “Azure truly is the world’s computer,” and many are already calling Azure Arc a game-changer. So what…

Microsoft-Cybersecurity-Framework-scaled

Infused Innovations Earns the Microsoft Security Competency

The Microsoft Security competency has been awarded to Infused Innovations for their recently announced Intelligent Threat Protection service. ITP is a security orchestration, automation, and response service that sits on top of the Microsoft security stack, and includes other strategic partnerships such as Jamf and KnowBe4. By earning this Security competency, which Microsoft also recently…

Passwordless-Path

Get Your Organization Ready to Leave Passwords Behind

So many passwords, such a headache and waste of keystrokes…I’m ready to drop these things completely. Chances are, you or your employees have felt this way to one extent or another. If you are a CISO or security manager, you’ve probably gone even further and thought to yourself: there’s got to be a more secure…

Microsoft-cyber-crime

Infused Innovations Launches Managed Infused Threat Protection

Infused Innovations is announcing their new managed Infused Threat Protection (ITP) service that is replacing their Secqur Aether platform. Along with the rebrand, Infused Innovations is adding the recently released Microsoft Azure Sentinel service to their arsenal. Azure Sentinel provides a cloud-native security information event management (SIEM) and security orchestration automation and response (SOAR) solution…

Identity_diagram

Start Moving to Modern Authentication

Microsoft has announced that it will end support for Basic Authentication in Exchange Online next year, on October 13, 2020. Various protocols will change their authentication methods, including Exchange Active Sync (EAS), Post Office Protocol (POP), Internet Message Access Protocol (IMAP), and Remote PowerShell (RPS) in Exchange Online. Applications that use any of these APIs/protocols will be…

IncidentResponse

Writing an Effective Security Incident Response Procedure

If you’re a chief information security officer, you need to write security incident response procedure documents (I’ll call them SIRPdocs). And your job can depend on the ability to write them well—Gartner suggests that up to 75% of CISOs who suffered publicly documented security breaches without well-tested security plans may have lost their jobs in…

PowerAutomate-Workflow

Microsoft Flow is Now Power Automate

Automation is a big topic today in the tech world. If you’ve heard of Microsoft Flow, that may be thanks to its robotic process automation (RPA) capabilities and how it can connect legacy and modern applications within a business. As announced at the Ignite conference 2019, Microsoft Flow is now called Power Automate, in line…

WVD-Services-Diagram

Step-by-Step Guide to Install FSLogix on WVD

With the recent GA of Windows Virtual Desktop (WVD) Microsoft has extended its ability to deliver important endpoint capabilities to users anywhere in the world. Designed to improve upon the standard Windows Virtual Desktop capabilities, installing FSLogix on WVD can enhance and simplify these sorts of non-persistent environments. Benefits of Installing FSLogix on WVD Maintain…

BT_NonProfit_Disability

Microsoft 365 Plans for Non-Profits

Non-profit organizations often underestimate their risk of cyber attacks. This leaves them more vulnerable than they realize and oftentimes an easier target than other kinds of companies. Yet failing to prioritize cybersecurity could have major effects—data losses, financial catastrophe, damaged reputation or even the need to shut down the organization altogether. Studies show that non-profits…

Microsoft-Ignite_

Microsoft Ignite 2019’s Top Announcements

Microsoft Ignite is the annual conference where the tech giant gets to show off its exciting new developments. The company’s many announcements are of interest to IT professionals, developers, and big Microsoft fans. We love hearing about new streamlined improvements and innovative previews offered. This year’s conference seemed to present more news than ever—Microsoft provided…

Autopilot

Windows Autopilot for Workstation Imaging

The typical process of acquiring new devices and configuring them for company use is a bit of a headache. It goes something like this: your IT admin gets the devices, wipes them of their default settings, re-images them with custom images using Ghost or Acronis, obtains drivers, configures the relevant applications and settings, and finally…

Bluekeep

PSA: Patch BlueKeep and DejaBlue Now

Microsoft issued two of the same warnings to its users this year: patch BlueKeep and DejaBlue on your vulnerable Windows systems. When the first and then the second warning went largely unheeded, the National Security Agency (NSA) published a rare advisory on June 4 urging Microsoft Windows administrators to update their operating systems. An NSA warning of…

Intune-MAM-Diagram

MAM and Intune: Sandboxing Corporate Data

In line with all of Microsoft’s products, Intune is designed to deliver top security for corporate data while optimizing user productivity. In this case, we’re focusing specifically on mobile devices and their apps. Intune is Microsoft’s Enterprise Mobility + Security (EMS) component that manages that area. Let’s take a look at the difference between mobile…

Minecraft

Microsoft 365 Plans for Education

Educational institutions face the cybersecurity risks of other organizations and more. Because of certain factors inherent to the nature of educational places, these institutions are at a greater security risk. Limited budgets, privacy concerns, intellectual property, and specific compliance regulations create an atmosphere that’s different from most organizations. The multiplicity of college departments makes for…

Diagram shows tasks of Azure Sentinel: Collect, Detect, Investigate and Respond.

What is Azure Sentinel?

Just as a soldier stands guard, ready to defend against surprise attacks, so stands this duo of SIEM + SOAR for your Security Operations Center (SOC). And like a hawk with an overhead view, it does so from the cloud. Throw in a bit of AI, and you have Azure Sentinel. It provides intelligent security…

Screenshot of iPadOS connecting to WVD Windows Virtual Desktop.

Connect to WVD from Anywhere

Connect to WVD (Windows Virtual Desktop) from anywhere, on any device. Learn how to turn your iPad Pro into a WVD thin client with a bluetooth mouse.

Windows-Virtual-Desktop-Marketing

WVD Pricing Guide (Windows Virtual Desktop)

WVD was released in preview back in March, and our step-by-step guide to deploy WVD is one of our most popular posts. Pricing for WVD has been known for a few months, but today Microsoft formally announced that Windows Virtual Desktop is now Generally Available (GA) worldwide. Let’s take a look at the total cost…

AzureSentinel-Pricing-1

Pricing for Azure Sentinel is GA

After being in Preview since February 2019, Microsoft just announced the General Availability and pricing for Azure Sentinel today! As a Gold Microsoft Partner with competencies in Azure Cloud Platform, DevOps, Security, and Enterprise Mobility, we’re excited to announce that we are adding co-managed SIEM and SOAR to our Secqur Aether services starting on day…

Shared-Responsibility

Shared Responsibility Matrix for Cloud Services

When migrating to the cloud, organizations sometimes mistakenly assume that the cloud service provider (CSP) takes on the role of securing their data and maintaining compliance. While the CSP does have many responsibilities in these areas, it’s important to remember that the customer is also responsible. The service model you choose dictates your accountability in…

CASB-market-1-with-border

Shadow IT Discovery with Microsoft Cloud App Security

Apps! You run the world! I can just hear Beyonce’s voice in my head–mainly because I just listened to it on Google Play Music. And by continuously monitoring Shadow IT Discovery with Microsoft Cloud App Security (MCAS), which is built-in natively on Windows 10 devices, Azure also knows that I just listened to Google Play…

Co-managedSIEM-1

Cybersecurity Automation with Azure Sentinel for SIEM and SOAR

Traditional security operations centers could get away with pre-set prevention technology and detection mechanisms based on prior knowledge of attack methods. But in the past few years threats have developed rapidly in both number and sophistication. It’s no longer enough to look at intelligence as a one-way product addressing occasional threats. Moreover, not all threats…

Gartner-EPP-MQ-Microsoft

Microsoft Intune for Unified Endpoint Management Leads in Gartner’s UEM Magic Quadrant 2019

When vision and capability are combined, magic happens. Perhaps that’s why the research company called their visual assessment the Magic Quadrant: it places companies on a scale measuring their completeness of vision with their ability to execute, and then gives them a label of a niche player, challenger, visionary or leader depending on where they…

NIST-Financial-Regulation-Mapping

Financial Cybersecurity for Modern Hacks on World Banks

We hear about a large world bank hack almost every week these days. From the recent Capital One breach to the European Central Bank attack, how can you trust that your bank is safe? The financial industry must follow a number of compliance frameworks on their IT systems to secure and protect data. Unfortunately, we…

Ransomware-Protection-1-e1566920924903

A Guide to Ransomware Protection with Microsoft 365

Protecting modern IT systems from ransomware is fairly simple now with Microsoft 365. Microsoft uses AI models and machine learning to process 6.5 trillion daily signals with a team of 3,500+ full-time security engineers that invest $1 billion annually in R&D. To put that in perspective, a managed SOC like Arctic Wolf processes “only” 20…

image-3

Embracing and Growing An Innovation Mindset

If you think of buzzwords that different people like to apply to their businesses, “innovative” is often at the top of the list. However, there’s a good reason for this. For an organization to be innovative, it implies that they:  Are paying attention to trends and other changes to their field.  Implement those changes as needed. Constantly…

Windows-Defender-Marketing

Microsoft’s Windows Defender AV Earns “Top Product” Award in June 2019 Antivirus Comparison

Microsoft’s Windows Defender AV just received the top score and “Top Product” award from the independent German institute, AV-Test. Wow, that’s not something you hear very often! In fact, one of the most common statements that we hear when discussing cloud security with Microsoft 365 is: “Microsoft made the security abomination that is Windows XP,…

SecureAuthentication

Go Passwordless With Microsoft 365

Using SMS for MFA and resetting passwords every 90 days is a losing game. People write passwords on sticky notes, and your phone carrier will let hackers port your phone number to a new SIM card. Going passwordless with biometric unlocks is the only way forward. Your phone can unlock with your fingerprint or FaceID,…

NIST-CSF

The Fundamentals of a Strong Cybersecurity Framework

The intent of implementing a cybersecurity framework is to increase the effort of an attacker to gain privileged access. By breaking the attacker’s economic attack model, you can effectively secure an attack vector. If we look at the statistics regarding data breaches, the sheer number of incidents has grown exponentially over the last 10 years…

Valimail

Step-by-Step Guide to Configure Valimail for DMARC Monitoring With Office 365 and Azure SSO

Last month, Microsoft announced that anyone with an active Office 365 subscription can configure Valimail for DMARC monitoring for free! Great! But what the heck does that mean? In simple terms, it means you can eliminate 40-70% of phishing and spoofing attacks on your domain, and you’re going to help make the Internet a safer…

MicrosoftThreatProtection

Zero Trust Security Concepts and Microsoft 365

88 records were lost or stolen every second in 2017, and that number is only likely to increase. The two most common settings for these breaches to take place are healthcare and banking as a distant second. As companies move to ensure their entire supply-chain is compliant to meet strict regulations, such as GDPR and…

WindowsServerGen2Header

Guide to Deploy Gen2 VMs in Azure

This week Microsoft announced the public preview of support to deploy gen2 VMs in Azure. Gen2 VMs have been around since Windows Server 2012 R2 for on-premises Hyper-V deployments. However, there are some serious limitations during the Azure preview. Let’s look at the benefits first. Why Should I Deploy Gen2 VMs in Azure? For security…

Microsoft365-Banner

Guide to Deploy Office 365 ProPlus in Windows Virtual Desktop

I deployed Windows Virtual Desktop (WVD) four times the day it came out and shared my thoughts about it. One of the first questions I received was how to deploy Office 365 ProPlus in Windows Virtual Desktop. That’s because if you run the web installer on any multi-user computer with Terminal Services, you’ll receive the…

Sentinel-Featured

Step-by-Step Guide to Deploy Azure Sentinel

Azure Sentinel is by far the most exciting announcement out of Redmond so far this year. Aside from that, what is Azure Sentinel? It’s a 100% cloud based Security Information Event Management (SIEM) solution. I’ve been referring to Log Analytics with Azure Security Center as Microsoft’s cloud SIEM solution for a couple years, but Azure…

Azure-Devops

Infused Innovations Earns Microsoft DevOps Gold Competency for their Azure DevSecOps Platform: Infused Threat Protection

We are proud to congratulate the Infused Innovations engineering team for their continued demonstration of expertise across the Microsoft cloud ecosystem. As Infused Innovations expands its service offerings into new areas, we have taken a three-pillar approach to our internal processes: automate for agility & consistency, deploy to the cloud for availability, and make sure…

Microsoft365

The Complete Office 365 and Microsoft 365 Licensing Comparison

Full Microsoft 365 licensing comparison matrix of subscriptions that includes features and pricing for Office 365, EMS and Windows 10 Enterprise plans.

WVD-MFA

Step-by-Step Guide to Securing Windows Virtual Desktop in Azure with Conditional Access and MFA

One of my biggest complaints about using Azure AD P1 to issue Azure MFA challenges on a traditional RDS deployment via RADIUS authentication is that it issues an MFA challenge on every login. That’s almost as frustrating as trying to understand Microsoft Licensing. Fortunately, securing Windows Virtual Desktop in Azure with Conditional Access and MFA…

windows-virtual-desktop-example

Step-by-Step Guide to Deploy Windows Virtual Desktop in Azure

Windows Virtual Desktop (WVD) was finally released to public preview GA (UPDATED 9/2019), so here’s your step-by-step guide to deploy Windows Virtual Desktop! For those of you that have been living under a rock (or spending time with your friends and families), WVD is Microsoft’s new Desktop-as-a-Service offering to provide Windows 10 virtual desktop infrastructure…

AAD-UserRiskPolicy0

Threat Hunting with Azure AD Premium Subscriptions

Every cloud security workshop that I perform with a client to enable Microsoft’s Enterprise Mobility + Security (EM+S) suite typically yields an unpleasant surprise. I had the CFO of one company demand the immediate implementation of Roles Based Access Control (RBAC) after seeing the granularity of the audit capabilities of Cloud App Security. During my…