Security

Ransomware Attack at MSU: Keep your company safe

While we're all focused on working through COVID in the real world, hackers are working their nefarious scams in the virtual world. Their latest target is close to home – Michigan State University. A ransomware attack infected MSU yesterday stealing student data, files, and financial information. Red Level has solutions to protect your clients, data, and reputation, but there are also several simple things you can do to stay safe: Apply patches and updates. Ensure that systems are up to date and that all software updates are installed. Double-check email addresses. Watch for unfamiliar names and domains, as well as ‘spoofed’ accounts pretending to be trusted contacts. Think before clicking. Don’t click or download suspicious or unexpected attachments, or visit [...]

2020-05-29T16:10:44+00:00By |Ransomware, Security|

New Years Resolutions for Smart Business Leaders

https://youtu.be/UaSD-VIGNAY Everyone is busy getting ready for the holidays. It's crazy to think 2020 is just around the corner. And while a lot of people are talking about their same old New Year's Resolutions – lose weight, exercise more and save money – smart business owners should be thinking about their new year – and new decade tech resolutions. Is 2020 going to be a year of growth and success for your company? It can be if you make these three simple tech resolutions. Lose weight. It's time to trim down all that old on-prem hardware in your server room. Make a resolution to move to the cloud. Red Level is helping companies do more for less with cloud [...]

Use Exchange Online Protection to Protect Your Business Against Online Threats

Exchange Online Protection (EOP) is a service that is hosted by Microsoft as email security for your organization it's always on filtering spam, in addition to removing malware and viruses, so you don't have to. What is Exchange Online Protection Service?  Microsoft Exchange Online Protection is a cloud-based email filtering service that helps protect your business against online threats, including spam and malware. How can it be used? Exchange Online: Built-in to Office 365 email subscription Standalone Scenario: Protection for your existing on-premises email server Hybrid deployment: Protection for both on-premises and cloud mailboxes EOP provides several convenient services, and there is no software to install. It is built-in and ready to go for Office 365 subscribers. For Exchange Hybrid [...]

Identity Challenges for Today’s Organizations

As we move into a cloud-first world, identity protection is becoming more necessary and prevalent. A cloud-first world has a lot of benefits, but it also comes with its challenges. Identity Challenges for Today’s Organizations The explosion of apps on-premise and BYOD and external users outside your corporate network are coming in, and those could be customers, vendors, partners, contractors, whoever is needing access to collaborate share data. The result of that there’s been an increase in identity attacks, and for most organizations, they lack the visibility and control. Increases in identity attacks and lack of visibility and control is leaving organizations vulnerable. Some organizations have protocols in place to watch out for suspicious activity. However, organizations may not have [...]

Protect Against Spoofing

Office 365 Exchange Online is a robust email platform, but it’s still vulnerable to cyber-attacks. One such attack is spoofing. Spoofing is when somebody with malicious intent sends an email to trick you into thinking that the email is coming from someone you know within your organization or someone you receive emails from regularly. For example, I received one last week from someone that appeared to be from Amazon for Business the email was telling me to reset my password to click to verify and asking me to put in my credentials. It looked very similar to an Amazon email. It had the Amazon logo, and the form was professionally done. However, I do not have an Amazon for Business [...]

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the [...]

Azure Information Protection

How do you ensure your organization's confidential documents are accessible by approved eyes only? Fear not. Azure Active Information Protection can be your trusted friend to ensure that the sensitive data is well protected when appropriate groups or policies are set up and implemented. Specifically, Azure Information Protection, which is data loss prevention (DLP) for documents can be utilized to secure your confidential data. This blog provides a high-level overview of the DLP solution for Microsoft Azure. There are some different ways to start leveraging the platform and protecting your sensitive documents. Labels Place appropriate labels on your documents - you can have these labels applied by the users as they're editing documents Using client application and plugins into the [...]

Azure Active Directory Identity Management

Microsoft Office 365 is widely used in many organizations. If you are an administrator for your Office 365, you are likely to be familiar with the Admin Center to look at user accounts and monitor activities. But do you know all the account activities were pulled in from Azure Active Directory in the cloud and are only displayed in the admin center?  If you've got Dynamics, Exchange, SharePoint, or any of the Microsoft software that is in the Cloud, it's going to be using Azure Active Directory as its Identity Manager in the back end. There are a couple different approaches to manage identity in Azure Active Directory. Identity Sharing- As an admin, you may be familiar with creating Active Directory [...]

Multi-Factor Authentication Conditional Access Configuration

Multi-Factor Authentication Conditional Access and Policies Configuration Multi-factor authentication (MFA) creates an extra step to verify user identity who wants to gain access to your server or database. MFA provides greater security with that layered authentication approach. When hosting MFA on-premises, you can lock down the server or cloud applications that are tied in with Microsoft ADFS (Active Directory Federation Services) in the environment that you have deployed. In this blog, we will be discussing a couple of different ways to manage the cloud version MFA, including setting up conditional access for your MFA. MFA Management Console Go to your Groups and select MFA authentication You should see a list of your users with an indication if they have already [...]

Windows Security Update Headache? Try This Fix.

Security matters – we all understand that.  No matter how highly refined an operating system or environment may be, there will always be some areas of vulnerability – and there will always be someone looking to take advantage of them. Generally, we can be grateful for the fact that Microsoft is pretty diligent about rooting out these vulnerabilities and addressing them; those periodic security updates have undoubtedly saved an incalculable amount of grief. That’s not to say, though, that the update process will always be hassle-free. Safety comes at an occasional cost, at least in terms of convenience. Many of us were reminded of this with the recent release of Windows Security Update Fix KB4103727. Users who have implemented the [...]

2020-06-26T14:11:28+00:00By |Security, Windows, Windows Update|