Simon Yock

To Succeed, Enterprise Cybersecurity Needs IoT Scale

The recent increase in the number of employees working from home as a result of the COVID-19 outbreak has presented organizations with an unanticipated business issue: the enterprise network has now effectively become much larger, more dispersed, and more difficult to secure with the increase in remote work.

WastedLocker Ransomware

The recent increase in the number of employees working from home as a result of the COVID-19 outbreak has presented organizations with an unanticipated business issue: the enterprise network has now effectively become much larger, more dispersed, and more difficult to secure with the increase in remote work.

zero-trust-guide

Zero Trust Guide: Home Network Security

The recent increase in the number of employees working from home as a result of the COVID-19 outbreak has presented organizations with an unanticipated business issue: the enterprise network has now effectively become much larger, more dispersed, and more difficult to secure with the increase in remote work.

02-antivirus

Netwalker Fileless Ransomware

NetWalker has become one of the most popular ransomware families in 2020, targeting companies of all sizes and more recently favoring educational and healthcare institutions. The ransomware is using the current COVID-19 crisis to deploy phishing campaigns that prey on individuals interested in learning more about the virus, including healthcare facility staff.

application-whitelisting

Application Whitelisting

Application Whitelisting works by specifying which applications can execute (The Whitelist) leaving everything else implicitly or explicitly denied (The Blacklist). Granted, there will always be some that fall in the middle (The Greylist) but those should be reserved for administrative decision.

azure-atp

Managing Inside Threats: Microsoft Azure ATP Lateral Movement Paths

While the ability to monitor network traffic in and out of your network, sometimes known as North-South traffic, is well known, understood, and managed, there is a greater risk that is more challenging. Monitoring the traffic inside of your network that never leaves the boundaries of your systems, also sometimes known as the East-West traffic, can be very difficult.

teams

Work Remotely And Securely With Microsoft Teams

Data is the gold rush of this century, and it represents a tremendous amount of value to those that have it and those that want it. Data can be anything from personally identifiable information to intellectual property to a strategic advantage to information about vulnerabilities in systems. In the right hands, it represents incredible strength and advantages. In the wrong hands, it causes significant harm and disadvantage. It makes sense to take reasonable steps in safeguarding your data.

Application_Whitelisting_scknpt

Leverage Your Existing Microsoft Investments for Application Whitelisting

Data is the gold rush of this century, and it represents a tremendous amount of value to those that have it and those that want it. Data can be anything from personally identifiable information to intellectual property to a strategic advantage to information about vulnerabilities in systems. In the right hands, it represents incredible strength and advantages. In the wrong hands, it causes significant harm and disadvantage. It makes sense to take reasonable steps in safeguarding your data.