How to Shift from a Reactive to a Proactive Cyber Security Approach

As you’ve probably heard, cyber attacks are up this year. But while big-name breaches tend to get the most attention, it isn’t just enterprise companies that are at risk. In fact, some hackers specifically target SMBs and mid-market companies, due to the lax security that many have.

Consider this: while many business owners rate cybersecurity as a top concern, only 57% have actually implemented any type of security plan.

Azure and Microsoft 365 Security: What are Security Defaults?

 Microsoft recently released Security Defaults to help customers make their Microsoft 365 and Azure environments more secure FOR FREE.  Before you say it… you’re right… nothing is free, it’s included at no additional cost.  Microsoft is making these features available to everyone because identity-based attacks have skyrocketed over the last couple of years.  As Microsoft […]

Best Practices for Security and Patch Management

These are some notes I took at TechEd a couple of years ago. 7 Steps to Secure Environment: Establish a Security Team Security Assessment – What impacts our bottom line? What is normal? Risk Analysis – For the Assets Write a Security Policy. Enforce it. Design Operations Plans and Security Standards Implement Training and Awareness […]

OCS 2007 Port Requirements

Office Communication Server 2007 has a number of port requirements that are specific to the feature that you will be deploying. The following diagram breaks out the required ports based on the server role you are deploying. Continue Reading