With 2020 being around the corner, it is important to mindful of the vast wave of Microsoft products which are being end of life.
From a Microsoft Azure Active Directory perspective, there are two approaches to MFA:
1. A laser accurate approach specific to the application in the Azure blade using conditional access
2. A global approach managed through the “Multi-factor authentication” page via Office 365
Password complexity has been touted for some time to prevent identity theft. Especially in an Active Directory environment. Typical password complexity rules in Active Directory are:
Over the past few years, no buzzword in IT has been used more frequently than the cloud. For the beginning of its lifespan, the cloud was thought to be something to approach cautiously. There were security concerns, vendor concerns, and even questions about what it actually was.
Cybersecurity has become a frequently used term in business these days.
Whether you hear it in the news or in a meeting, most people are aware that businesses everywhere, and every size, are being targeted by cyber criminals. Just recently companies such as Equifax, Netflix, Sonic, and Yahoo! found their names in the headlines as the latest victims. However, the smaller companies that are also victims hardly get a mention even though they account for 43 percent of all incidents, which cost them an average of $879,582 in damages.
Although we’ve discussed the costs of legacy technology to a business in past blog posts, it’s often only truly apparent that it’s become a major challenge for the business when seen in its totality of incidents. By taking stock of the challenges that your business faces daily, weekly, and monthly in ways that have both short-term and long-term negative consequences, it becomes easier to make decisions about the right time to move to virtualization. In that vein, here are five signs it’s time to virtualize your legacy technology.
It’s hard to read the news nowadays without seeing some organization falling victim to a ransomware attack.
How does ransomware work? To put it simply: Ransomware is a form of cyber extortion. When a computer is infected, all of the files on the computer are encrypted. Instructions for how to pay the ransom, and the amount to pay, are displayed on the screen. When the victim pays up, they receive a decryption key that will unlock the files so they can access them once again.
In a recent Indeed survey of more than 1,000 hiring managers and recruiters, more than half (53 percent) of respondents have hired tech talent despite candidates not meeting the job description requirements. That may be a good thing for businesses in need of IT resources to fill gaps in their talent pool. While that alludes to the fact that businesses are working hard to meet their needs for IT talent in what must be creative ways, here are five of those ways that businesses can employ to fill the gaps in IT resources and talent.
Last year, government agencies and businesses in the United States suffered losses from 1,093 reported data breaches. That number is likely higher due to the fact that these attacks are rarely spotted for months after the initial attack takes place. As Eva Casey Velasquez, chief executive officer of the Identity Theft Resource Center puts it, “this [number] is the best-case scenario.”
PowerShell is a powerful tool for administrators in an Office 365 migration, as it can simplify the process in many ways. This automation platform and scripting language for Windows and Windows Server that allows you to simplify the management of your systems harnesses the power of .NET Framework. Because there are numerous nuanced aspects to migration, it's beneficial to have a guide to using PowerShell that briefly explores the staged migration process.