Posts Tagged ‘cloud security’
About Microsoft Secure Score – Free Guide
About Microsoft Secure Score – Free Guide December 24, 2020/ Resources What is Microsoft Secure Score? Microsoft Secure Score is a convenient and effective tool for you to assess your Microsoft 365 and overall security status. It is a part of Microsoft’s Threat and Vulnerability Management. The Secure Score tool gives you insight in to…
Read Full PostTwo Factor Authentication on Microsoft 365 Begins Soon
It’s time for your company to enable Two Factor Authentication on your Microsoft accounts, before Microsoft locks you out – but your employees may be pushing back. Here is an explanation and instructions to get everyone prepared for the October cut-off date, even if you wait until the last day to actually pull the trigger.…
Read Full PostWhat is Identity Access Management (IAM)?
An Introduction to Identity and Access Management (IAM) IAM, short for Identity and Access Management, is a framework of policies, processes, and technologies to provide business owners and IT managers control over users who access their organization’s network or cloud accounts. The IT department, or your Managed Services Provider (MSP) must ensure that everyone accessing…
Read Full PostWho Is Responsible For Cloud Security?
As a small business owner using cloud services, you might assume everything is secure right? Well, yes. And no. Your cloud providers have responsibilities to you, for protecting your data, but you also have responsibilities to yourself in protecting your data and the data of your clients. The way your team applies or ignores best…
Read Full PostBuilding A Zero Trust Network For Small Business with Microsoft 365
In the era of total connectivity, companies who follow the old ways of doing network security are running great risks. It’s important to understand the Zero Trust Network for small business, why this is the new networking standard for IT security, and how to get started with Microsoft 365. Microsoft offers powerful tools for cloud…
Read Full PostWhat Controls are Needed for Cloud Security With Azure Active Directory?
As practically everything migrates to the cloud, cybersecurity has quickly become a top priority worthy of attention from the SMB owners and corporate executives alike. But protecting critical data isn’t the same as it was a decade ago. Things were simpler then, when simply protecting the perimeter was good enough. Today you have to assume…
Read Full PostMicrosoft 365 – Should Employees Have Global Administrator Permissions?
When it comes to online security, small oversights commonly made by small business owners can quickly become big problems. If you are using Office 365 should team members have global administrator permissions? The short answer is no. Today, our team at TUCU will explore Office 365 security, and explain how small business owners and their…
Read Full PostMobile Device Management in Office 365 & G Suite
Mobile Device Management (MDM) allows your IT manager or IT support company to remotely troubleshoot mobile devices and to enforce IT security policies such as screen locks and strong passwords. MDM also allows for separation of personal and company owned data on mobile devices, and is considered a must have for any BYOD policy. Today we…
Read Full Post