Closeup of woman peeking at blog title About Microsoft Secure Score

About Microsoft Secure Score – Free Guide December 24, 2020/ Resources What is Microsoft Secure Score? Microsoft Secure Score is a convenient and effective tool for you to assess your Microsoft 365 and overall security status. It is a part of Microsoft’s Threat and Vulnerability Management. The Secure Score tool gives you insight in to…

Read Full Post
2 factor authentication on accounts

It’s time for your company to enable Two Factor Authentication on your Microsoft accounts, before Microsoft locks you out – but your employees may be pushing back. Here is an explanation and instructions to get everyone prepared for the October cut-off date, even if you wait until the last day to actually pull the trigger.…

Read Full Post
what is identity access management hero

An Introduction to Identity and Access Management (IAM) IAM, short for Identity and Access Management, is a framework of policies, processes, and technologies to provide business owners and IT managers control over users who access their organization’s network or cloud accounts. The IT department, or your Managed Services Provider (MSP) must ensure that everyone accessing…

Read Full Post
cloud services you are responsible for cloud security hero

As a small business owner using cloud services, you might assume everything is secure right? Well, yes. And no. Your cloud providers have responsibilities to you, for protecting your data, but you also have responsibilities to yourself in protecting your data and the data of your clients. The way your team applies or ignores best…

Read Full Post
Zero Trust Networks

In the era of total connectivity, companies who follow the old ways of doing network security are running great risks. It’s important to understand the Zero Trust Network for small business, why this is the new networking standard for IT security, and how to get started with Microsoft 365. Microsoft offers powerful tools for cloud…

Read Full Post

As practically everything migrates to the cloud, cybersecurity has quickly become a top priority worthy of attention from the SMB owners and corporate executives alike. But protecting critical data isn’t the same as it was a decade ago. Things were simpler then, when simply protecting the perimeter was good enough. Today you have to assume…

Read Full Post
Mobile device management post art

Mobile Device Management (MDM) allows your IT manager or IT support company to remotely troubleshoot mobile devices and to enforce IT security policies such as screen locks and strong passwords.  MDM also allows for separation of personal and company owned data on mobile devices, and is considered a must have for any BYOD policy. Today we…

Read Full Post