CLOUD SECURITY POSTURE MANAGEMENT: AZURE SECURE SCORE

CLOUD SECURITY POSTURE MANAGEMENT: AZURE SECURE SCORE

Cloud Security Posture Management (CSPM) is the buzz-word these days although relatively new. It comes in different flavors, different tools, all depending on your security needs. CSPM enables you to avoid misconfigurations that can potentially lead to data leakage(s).

Lees meer

Secwise doet voor FIT cyberdeuren op slot

Secwise doet voor FIT cyberdeuren op slot

In 2015 trok Flanders Investment & Trade een IT-strategie op gang die hen stelselmatig naar de cloud zou brengen. Tegelijk kwam er naast de traditionele, centrale perimeterbeveiliging ook aandacht voor decentrale cyberveiliging. Na verschillende security-audits en evaluatie van een aantal beveiligingstoepassingen koos FIT voor de beveiligingssuite van Microsoft 365 Defender.

Lees meer

GO! wint een halftijdsequivalent met nieuwe securitytoepassing van Microsoft

GO! wint een halftijdsequivalent met nieuwe securitytoepassing van Microsoft

Anderhalf jaar geleden werd het Gemeenschapsonderwijs het slachtoffer van digitale inbraakpogingen. Met name de software voor virtuele desktops werd geviseerd. Voor ICT-manager Jan Buytaert was dat niet alleen het finale signaal om de migratie naar Microsoft Azure en Microsoft Office 365 te versnellen, het was ook de aanleiding om cyberbeveiliging wat steviger in handen te nemen.

Lees meer

Remote working: cyber security risks and best practices

Remote working: cyber security risks and best practices

COVID-19 has impacted businesses and employees in various ways. One common fact is that we all tumbled into the sudden need to work remotely. But without the appropriate controls, new risks will unintentionally be introduced into your organization. Work remotely in a secure manner with our top 5 threat checks.

Lees meer

Keep control over your corporate data on users’ personal devices

Keep control over your corporate data on users’ personal devices

The management of personal devices isn’t always an easy sell within an organization – employees are often reluctant to have their personal device managed by their employer. Luckily, there is Microsoft Application Management (MAM), which helps companies secure corporate data on mobile devices.

Lees meer

Turn off Azure AD ‘Application consent by users’ now!

Turn off Azure AD ‘Application consent by users’ now!

SecWise has seen a growing number of attacks that rely on the application consent default configuration in Azure AD, which allows threat actors to get access to users’ data, mails and more. It is strongly advised to turn off this feature as soon as possible!

Lees meer

Protecting corporate data with Windows Information Protection

Protecting corporate data with Windows Information Protection

As users can access data from anywhere, it is a lot tougher to protect this data, especially for BYOD users that are accessing corporate data from their personal devices. Microsoft has built Windows Information Protection (WIP), to help organizations easily protect their corporate data accessed from unmanaged devices. WIP allows you to define and enforce policies to apps.

Lees meer

Azure Active Directory: IAM for the future

Azure Active Directory: IAM for the future

When talking to customers about Microsoft 365 security, we often kick off with reviewing the security of Azure Active Directory. Whether you are using O365 (E1 or E3), Intune (or any other product from the EMS Suite) or Azure IaaS and PaaS services, you already have Azure Active Directory! In this blogpost, we highlight the most important Azure AD features that you should be aware of.

Lees meer

Microsoft’s Cloud Security license bundles demystified

Microsoft’s Cloud Security license bundles demystified

Microsoft is and has always been keen on offering multiple options to the customer to acquire their different tools. The only downside to this strategy is that it is often complicated to find the best fit from a customer’s point of view. Therefore, we’ll demystify the license bundles in this blog, focusing on the different security solutions in the bundles.

Lees meer