&#x;&#x;

Cyber Security Blog
Raising awareness of global cyber security issues.

22 Aug 2020: WastedLocker Ransomware

The recent increase in the number of employees working from home as a result of the COVID-19 outbreak has presented organizations with an unanticipated business issue: the enterprise network has now effectively become much larger, more dispersed, and more difficult to secure with the increase in remote work.

zero-trust-guide
01 Aug 2020: Zero Trust Guide: Home Network Security

The recent increase in the number of employees working from home as a result of the COVID-19 outbreak has presented organizations with an unanticipated business issue: the enterprise network has now effectively become much larger, more dispersed, and more difficult to secure with the increase in remote work.

02-antivirus
15 Jul 2020: Netwalker Fileless Ransomware

NetWalker has become one of the most popular ransomware families in 2020, targeting companies of all sizes and more recently favoring educational and healthcare institutions. The ransomware is using the current COVID-19 crisis to deploy phishing campaigns that prey on individuals interested in learning more about the virus, including healthcare facility staff.

application-whitelisting
01 Jul 2020: Application Whitelisting

Application Whitelisting works by specifying which applications can execute (The Whitelist) leaving everything else implicitly or explicitly denied (The Blacklist). Granted, there will always be some that fall in the middle (The Greylist) but those should be reserved for administrative decision.

azure-atp
15 Jun 2020: Managing Inside Threats: Microsoft Azure ATP Lateral Movement Paths

While the ability to monitor network traffic in and out of your network, sometimes known as North-South traffic, is well known, understood, and managed, there is a greater risk that is more challenging. Monitoring the traffic inside of your network that never leaves the boundaries of your systems, also sometimes known as the East-West traffic, can be very difficult.

teams
01 Jun 2020: Work Remotely And Securely With Microsoft Teams

Data is the gold rush of this century, and it represents a tremendous amount of value to those that have it and those that want it. Data can be anything from personally identifiable information to intellectual property to a strategic advantage to information about vulnerabilities in systems. In the right hands, it represents incredible strength and advantages. In the wrong hands, it causes significant harm and disadvantage. It makes sense to take reasonable steps in safeguarding your data.

Application_Whitelisting_scknpt
15 May 2020: Leverage Your Existing Microsoft Investments for Application Whitelisting

Data is the gold rush of this century, and it represents a tremendous amount of value to those that have it and those that want it. Data can be anything from personally identifiable information to intellectual property to a strategic advantage to information about vulnerabilities in systems. In the right hands, it represents incredible strength and advantages. In the wrong hands, it causes significant harm and disadvantage. It makes sense to take reasonable steps in safeguarding your data.

09-DLP_m0sfed
01 May 2020: Safeguard Your Data with Microsoft 365 Data Loss Prevention

Data is the gold rush of this century, and it represents a tremendous amount of value to those that have it and those that want it. Data can be anything from personally identifiable information to intellectual property to a strategic advantage to information about vulnerabilities in systems. In the right hands, it represents incredible strength and advantages. In the wrong hands, it causes significant harm and disadvantage. It makes sense to take reasonable steps in safeguarding your data.

remote
15 Apr 2020: A Suddenly Remote Workforce: Coronavirus Concerns

Now that the working world is forced to adopt a new type of productivity with the emergence of coronavirus COVID-19, organisations of all size are adjusting to “Business As Unusual”. Traditional office workers are suddenly facing the prospect of working from home and their employers are in a predicament to facilitate it. The challenges in securely managing systems and data have suddenly increased ten-fold, leaving managers and employees alike scrambling to adapt.

bird-animal-freedom
01 Apr 2020: Microsoft Azure Sentinel: Make your SIEM SOAR like an eagle

Over the past decade or more, we have seen a tremendous shift in business infrastructure away from the traditional on premise systems and services towards cloud-based X-As-A Service (XaaS). Instead of having all of our hardware and software safely located inside the walls of our bricks & mortar offices, we now have only basic connectivity devices.