Blog

Remote working: Are you providing the required security?

In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from home. Without a doubt, this is the result of a cloud journey which started years ago, when Office 365 provided online versions of Word, Excel, Outlook and OneDrive, allowing people to […] In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees  … In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from  … In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from home.  …

Bridging Identity With The Cloud

We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance and Administration (IGA). Although Identity and Access Management (IAM) as a practice has been around for many years, most implementations still go awry. Why is this? In my humble opinion, the traditional implementation approach has been wrong. Cloud versus […] We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance  … We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance and Administration (IGA).  … We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance and Administration (IGA). Although  …

The DEFINITIVE Corporate Data Security Checklist For Your Organization

In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach has risen 12% over the past five years[1] and now costs $3.92 million on average. This past year alone, over 2.3 billion records have been involuntarily leaked[2]! […] In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT  … In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach  … In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach has risen  …
Office 365 Security Assessment

You’re Vulnerable. And You Don’t Even Know It —Microsoft Office 365 Security Misconfigurations

The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office 365 implementations. The report echoes our finding over the last few years – many organizations adopted Office 365 without doing a proper assessment of their security needs, and how these should be supported by […] The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of  … The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office  … The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office 365  …

The Case for Modernizing Your Active Directory

Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a good idea—it’s a necessity. Unfortunately, few IT departments are equipped to undertake such a project. Malheureusement, très peu de services de TI internes sont bien outillés pour entreprendre un tel projet. Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning  … Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a  … Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a good  …

What is Microsoft 365?

Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility + Security (EMS) together, to simplify licensing and management. Microsoft 365 is an integrated solution that helps businesses effectively address identity and security issues and safeguard apps and data on-premises, in the cloud, and across devices. Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility  … Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility + Security (EMS) together, to  … Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility + Security (EMS) together, to simplify  …

Key IT Integration Challenges & Solutions Following a M&A

IT integration projects are often not a top priority during the due diligence and early integration phases. One CIO mentioned that the business may actually request that no changes be made in the first six months, meaning the IT consolidation that would drive many ongoing efficiencies is left unfunded. And the IT pain points associated with the lack of centralization start rising to the surface. IT integration projects are often not a top priority during the due diligence and early integration phases. One  … IT integration projects are often not a top priority during the due diligence and early integration phases. One CIO mentioned that the business  … IT integration projects are often not a top priority during the due diligence and early integration phases. One CIO mentioned that the business may  …

Active Directory and Regulatory Compliance: What You Need to Know

You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active Directory, you reduce your exposure both now and into the future. You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active  … You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active Directory, you reduce your exposure  … You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active Directory, you reduce your exposure both now  …

Service Levels and Active Directory Disaster Recovery

To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build an effective disaster recovery plan and ensure that it is regularly tested, reviewed and refined. Offering service levels on Active Directory under these circumstances is achievable. Do these things and it will be good for your business-and your sleep! To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build  … To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build an effective disaster recovery  … To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build an effective disaster recovery plan and  …