Security Poverty Lines

Security Poverty Lines 1

When we think of the term “security poverty lines,” we rarely think of organizations’ abilities to maintain good hardware and cybersecurity. Yet this is a largely unrecognized problem for many of today’s companies. In a podcast on Security Nation, head of of advisory CISO services at Duo Security Wendy Nather discusses the problem of the…

Read More

Step-by-Step Guide to Install FSLogix on WVD

Step-by-Step Guide to Install FSLogix on WVD 2

With the recent GA of Windows Virtual Desktop (WVD) Microsoft has extended its ability to deliver important endpoint capabilities to users anywhere in the world. Designed to improve upon the standard Windows Virtual Desktop capabilities, installing FSLogix on WVD can enhance and simplify these sorts of non-persistent environments. Benefits of Installing FSLogix on WVD Maintain…

Read More

Microsoft Ignite 2019’s Top Announcements

Microsoft Ignite 2019's Top Announcements 3

Microsoft Ignite is the annual conference where the tech giant gets to show off its exciting new developments. The company’s many announcements are of interest to IT professionals, developers, and big Microsoft fans. We love hearing about new streamlined improvements and innovative previews offered. This year’s conference seemed to present more news than ever—Microsoft provided…

Read More

Windows Autopilot for Workstation Imaging

Windows Autopilot for Workstation Imaging 4

The typical process of acquiring new devices and configuring them for company use is a bit of a headache. It goes something like this: your IT admin gets the devices, wipes them of their default settings, re-images them with custom images using Ghost or Acronis, obtains drivers, configures the relevant applications and settings, and finally…

Read More

Microsoft 365 Plans for Education

Microsoft 365 Plans for Education 5

Educational institutions face the cybersecurity risks of other organizations and more. Because of certain factors inherent to the nature of educational places, these institutions are at a greater security risk. Limited budgets, privacy concerns, intellectual property, and specific compliance regulations create an atmosphere that’s different from most organizations. The multiplicity of college departments makes for…

Read More

Cybersecurity Automation with Azure Sentinel for SIEM and SOAR

Cybersecurity Automation with Azure Sentinel for SIEM and SOAR 6

Traditional security operations centers could get away with pre-set prevention technology and detection mechanisms based on prior knowledge of attack methods. But in the past few years threats have developed rapidly in both number and sophistication. It’s no longer enough to look at intelligence as a one-way product addressing occasional threats. Moreover, not all threats…

Read More

A Guide to Ransomware Protection with Microsoft 365

A Guide to Ransomware Protection with Microsoft 365 7

Protecting modern IT systems from ransomware is fairly simple now with Microsoft 365. Microsoft uses AI models and machine learning to process 6.5 trillion daily signals with a team of 3,500+ full-time security engineers that invest $1 billion annually in R&D. To put that in perspective, a managed SOC like Arctic Wolf processes “only” 20…

Read More

Zero Trust Security Concepts and Microsoft 365

Zero Trust Security Concepts and Microsoft 365 8

88 records were lost or stolen every second in 2017, and that number is only likely to increase. The two most common settings for these breaches to take place are healthcare and banking as a distant second. As companies move to ensure their entire supply-chain is compliant to meet strict regulations, such as GDPR and…

Read More

Guide to Deploy Office 365 ProPlus in Windows Virtual Desktop

Guide to Deploy Office 365 ProPlus in Windows Virtual Desktop 9

I deployed Windows Virtual Desktop (WVD) four times the day it came out and shared my thoughts about it. One of the first questions I received was how to deploy Office 365 ProPlus in Windows Virtual Desktop. That’s because if you run the web installer on any multi-user computer with Terminal Services, you’ll receive the…

Read More

Step-by-Step Guide to Deploy Azure Sentinel

Step-by-Step Guide to Deploy Azure Sentinel 10

Azure Sentinel is by far the most exciting announcement out of Redmond so far this year. Aside from that, what is Azure Sentinel? It’s a 100% cloud based Security Information Event Management (SIEM) solution. I’ve been referring to Log Analytics with Azure Security Center as Microsoft’s cloud SIEM solution for a couple years, but Azure…

Read More