cybersecurity

Top 5 Infrastructure Trends for 2019

We’ve bid 2018 farewell and welcomed 2019 with open arms. So what's next? What’s going to happen in 2019 from an infrastructure perspective? The answer for 2019 is similar to that of recent years. Cloud and security are still the top priorities. Let’s take a quick look at what may impact your infrastructure focus. 1. Exchange Migration Migrations from Exchange on-premises to Exchange online and upgrades from older versions of Exchange to the latest version are both projects going strong in 2019. We continue to support our clients who are going through these Exchange migration and upgrade processes and predict that Exchange migrations, upgrades, and support will continue to be a trend with our clients. 2. Multi-Factor Authentication To add [...]

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the [...]

Azure Information Protection

How do you ensure your organization's confidential documents are accessible by approved eyes only? Fear not. Azure Active Information Protection can be your trusted friend to ensure that the sensitive data is well protected when appropriate groups or policies are set up and implemented. Specifically, Azure Information Protection, which is data loss prevention (DLP) for documents can be utilized to secure your confidential data. This blog provides a high-level overview of the DLP solution for Microsoft Azure. There are some different ways to start leveraging the platform and protecting your sensitive documents. Labels Place appropriate labels on your documents - you can have these labels applied by the users as they're editing documents Using client application and plugins into the [...]

Azure Active Directory Identity Management

Microsoft Office 365 is widely used in many organizations. If you are an administrator for your Office 365, you are likely to be familiar with the Admin Center to look at user accounts and monitor activities. But do you know all the account activities were pulled in from Azure Active Directory in the cloud and are only displayed in the admin center?  If you've got Dynamics, Exchange, SharePoint, or any of the Microsoft software that is in the Cloud, it's going to be using Azure Active Directory as its Identity Manager in the back end. There are a couple different approaches to manage identity in Azure Active Directory. Identity Sharing- As an admin, you may be familiar with creating Active Directory [...]

Multi-Factor Authentication Conditional Access Configuration

Multi-Factor Authentication Conditional Access and Policies Configuration Multi-factor authentication (MFA) creates an extra step to verify user identity who wants to gain access to your server or database. MFA provides greater security with that layered authentication approach. When hosting MFA on-premises, you can lock down the server or cloud applications that are tied in with Microsoft ADFS (Active Directory Federation Services) in the environment that you have deployed. In this blog, we will be discussing a couple of different ways to manage the cloud version MFA, including setting up conditional access for your MFA. MFA Management Console Go to your Groups and select MFA authentication You should see a list of your users with an indication if they have already [...]

Red Level Expands Grand Rapids Datacenter Presence

Sometimes, important changes happen without anyone noticing. That was the case recently as Red Level greatly expanded our West Michigan datacenter footprint. We’ve been watching closely as the Grand Rapids-area market has grown and changed in recent years. Grand Rapids has been emerging as a powerful new hub for information technology-focused companies, both in the form of innovative start-ups and as a destination of choice for established companies looking to expand into a new market or relocate their operations. At the same time, a lot of the area’s established businesses have been embracing cloud-based solutions as a means of building their capabilities and modernizing their IT operations. Naturally, as the markets we serve and our clients’ needs grow, we need [...]

Email Phishing Becomes A Bigger & Bigger Threat

Phishing threat is no joke, despite the widows and princes. The phishermen are out there – just make sure you don’t get caught. Imagine: You come into work one morning and open a typical, innocuous-looking email. Unknown to you, that sets in motion a chain of events: Malicious code within the virus embeds itself within your laptop, forcing it to perform a series of hidden procedures that open gateways to your data, send spam emails to your contacts, and reproduce copies of the code. By lunchtime, several of your colleagues’ machines are doing the same thing. Twenty hours later, your entire network is infected, and all 70 employees are idled for two days! Can it happen? It happened recently to [...]