<img alt="" src="https://secure.hims1nice.com/151009.png" style="display:none;">
" style="background-color: #2c3e50;">
 

Blogs

Risks of Regulatory Non-Compliance

Posted by Brian Ray on Jul 24, 2023 10:00:00 AM
Read More

Topics: Security

What is Microsoft Defender EASM?

Posted by Cliff Embry on Mar 29, 2023 9:30:00 AM

Microsoft Defender External Attack Surface Management (EASM) is a comprehensive approach to managing and reducing the vulnerabilities and threats to a company's external attack surface. The external attack surface refers to the parts of a company's infrastructure and systems that are visible and accessible to external entities, such as hackers and cybercriminals.

Read More

Topics: Security, Defender

What is Microsoft Defender Threat Intelligence?

Posted by Cliff Embry on Mar 10, 2023 9:30:00 AM
Read More

Topics: Security, Defender

Why are IT Pros struggling with imaging and software deployment in Configuration Manager in 2022?

Posted by Tim Humphrey on Nov 3, 2022 1:38:24 PM
Read More

Topics: Security, Device Management, Intune

A reason to look at AutoPilot (Again) for Endpoint Configuration Manager customers

Posted by Tim Humphrey on Oct 31, 2022 9:30:00 AM
Read More

Topics: Security, Device Management, Intune

Preserve your Configuration Manager deployment by extending it to the Cloud

Posted by Tim Humphrey on Oct 10, 2022 1:59:29 PM
Read More

Topics: Security, Device Management, Intune

Exchange Server Zero-day Vulnerabilities

Posted by Cliff Embry on Oct 1, 2022 9:30:00 AM
Read More

Topics: Security, cloud security, M365

Managing Device Vulnerabilities - Part 1

Posted by Cliff Embry on Sep 22, 2022 9:30:00 AM
Read More

Topics: Security

10 Lessons Learned About Change Resistance for Cybersecurity

Posted by Cliff Embry on Sep 15, 2022 3:00:00 PM

One of the largest hurdles to cybersecurity change for any organization is resistance. This article outlines best practices for overcoming resistance and paving a faster path to success.

Read More

Topics: Security, Change Management, Zero Trust

Information Protection: The missing link

Posted by Cliff Embry on Jun 29, 2022 10:33:11 AM
Read More

Topics: Security, cloud security, M365