Microsoft Remote Desktop Protocol (RDP) Vulnerability Discovered

Microsoft Remote Desktop Protocol (RDP) is one of the most popular solutions used to access critical infrastructure servers for many organizations, including those who run virtual servers on Microsoft Azure. A group of hackers, called the Secret Club, inadvertently found a major flaw in Microsoft Remote Desktop Protocol (RDP) technology. A researcher found a cleartext […]

New Study Reveals Top Concerns for Microsoft Platform Management

Managing Microsoft environments can be complex and time-consuming, but they provide critical services to maintain business continuity and allow access to employees to keep them productive. Whether on-premises Active Directory, hybrid, or Microsoft 365 (formerly Office 365), IT executives must balance efficiency while maintaining Active Directory security, such as managing user and group permissions, and […]

NSA Discovers New Critical Exchange Server Vulnerabilities

Microsoft released three new patches for its Exchange Server software on Tuesday after the National Security Agency (NSA) alerted the company to a fresh batch of critical vulnerabilities. All discovered flaws, four in total, lead to remote code execution on a vulnerable machine. “We urge all owners and operators of Microsoft Exchange Servers to apply […]

Disgruntled IT Contractor in Jail | Protect Against Insider Threats

Large-scale internal security breaches are becoming increasingly more popular, costing companies millions of dollars each year. The sum of this loss comes from the financial damages of the breach itself and, in some cases more importantly, damage to the company’s reputation, translating to big dollars off the company’s bottom line. A recent judgement serves as […]

The #1 Way to Prevent Insider Threats

Data Breaches Happen Data security is nothing new. Where there is sensitive information, there are those who seek to access, steal, and misuse it. The unfortunate truth about malicious activities is that a third of all data breaches are perpetrated by someone from inside the company… and that number is growing. Businesses in the united […]

Security Budgets During COVID-19 – A New Infographic

When lockdown protocols kicked in due to COVID-19’s rapid spread all around the world, teams across many industries migrated to a work-from-home normal. However, with remote work comes new security risks—like employees accessing sensitive company assets through personal devices and home wifi. How have security budgets changed as a result of new and broadening security […]

What’s the difference between Microsoft user-based MFA and Azure MFA?

  If your business relies on cloud computing services, it’s essential that you set security defaults that include multi–factor authentication (MFA) to protect your resources. Protecting your user accounts during a sign in event is vital for securing accounts that require privileged access to data and other resources in the cloud. MFA has become the standard in electronic […]