<img alt="" src="https://secure.hims1nice.com/151009.png" style="display:none;">
" style="background-color: #2c3e50;">
 

Blogs

KiZAN Managed Services for Backups

Posted by KiZAN on Mar 31, 2023 2:03:50 PM

Data is the lifeblood of modern business, and it's crucial to ensure that it's protected and recoverable in the event of a disaster. Data loss can be devastating for businesses, resulting in lost revenue, damaged reputation, and even legal consequences. KiZAN Managed services for backups offer businesses a cost-effective and reliable way to ensure their data is backed up and recoverable in the event of a disaster.

Read More

Topics: Disaster Recovery, cloud security, Managed Services

KiZAN Managed Services for the Cloud

Posted by KiZAN on Mar 13, 2023 2:08:22 PM

In today's digital age, businesses of all sizes are increasingly relying on the cloud to store and manage their data. However, managing a cloud environment can be complex, time-consuming, and resource-intensive, especially for businesses with limited IT resources. That's where managed services for the cloud come in, providing businesses with the support they need to optimize their investment in Microsoft 365 and manage their cloud tenant components more efficiently.

Read More

Topics: cloud security, Managed Services

Managing Device Vulnerabilities - Part 2

Posted by Cliff Embry on Oct 5, 2022 12:26:15 PM
Read More

Topics: cloud security

Exchange Server Zero-day Vulnerabilities

Posted by Cliff Embry on Oct 1, 2022 9:30:00 AM
Read More

Topics: Security, cloud security, M365

Information Protection: The missing link

Posted by Cliff Embry on Jun 29, 2022 10:33:11 AM
Read More

Topics: Security, cloud security, M365

Microsoft Follina and Dogwalk Zero-Day Protection

Posted by Cliff Embry on Jun 10, 2022 6:30:40 PM

Defend against Follina and DogWalk

On May 30th, 2022, Microsoft issued CVE-2022-30190

This was in reference to the Follina, the first zero-day. The guidance reads:

"A remote code execution vulnerability exists when MDST is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights."

Read More

Topics: Security, cloud security, M365

Conditional Access 101 | Why you need it and how to use it

Posted by Curtiss Adams on Apr 5, 2022 8:30:00 AM
Read More

Topics: Security, cloud security

Microsoft Purview Information Protection Demystified

Posted by Cliff Embry on Mar 23, 2022 2:00:58 PM
Read More

Topics: Security, cloud security

Shields Up Security Guidance Issued | How to prepare for state-sponsored cyber threats

Posted by Cliff Embry on Mar 7, 2022 12:28:41 PM
Read More

Topics: Security, cloud security, M365

Improve Your IoT, OT, and Firmware Security

Posted by Curtiss Adams on Jul 27, 2021 11:49:08 AM
Read More

Topics: Security, IoT, cloud security