Increase in Mobile Phishing Attacks Highlight Need for Endpoint Security Solutions

A recent report from Lookout shows that mobile ransomware is on the rise. Mobile devices are frequently the most effective attack vector for cyber criminals looking to infect a business network. Ransomware can be devastating to an organization, grinding business processes to a halt and costing a company in time, money, and reputation. Endpoint security solutions are the answer.

Azure AD vs On premise: Why You Should Switch to Azure Active Directory

Azure Active Directory is Microsoft’s answer to managing the identities that access your network. It’s a single solution that provides a directory service, management of applications, and identity and role protection. Developers have used this tool for years to enforce user policies and rules, as well as to control access to applications. The latest change to Azure Active Directory is that it now can be run in the cloud.

How Office 365 Multi Factor Authentication Simplifies the MFA Process

Today, having a username and password to access an account isn’t enough. Hackers are working hard to steal any credentials they can get; Fortune says they’re selling them for around $15 on the dark web. NBC News says you can pick up an entire identity with everything from social security numbers to bank logins for around $1,200. 

Simplifying App Logins With Single Sign On Solutions

Our lives are complicated, in part, because we have multiple digital tools on multiple devices, each typically with its own password requirements. The solution for most of us is to use the same password across multiple devices. This poses a problem particularly for IT administrators that are tasked with improving cybersecurity. On the flip side, having multiple passwords is not only hard to keep track of, it also results in a lot of password resets and frustration for the end-user. 

The Best Solutions For Managing Remote Employees

Small Business Trends lays out the stats for us: around 3.9 million employees spend at least half the week working remotely. While this has been a terrific benefit for employees, there are drawbacks for IT managers. Instead of managing LANs and WANs, we’ve expanded our networks to include multi-device, multi-location, dispersed teams.

What You Need to Know About Mobile Application Management

There has been an evolution in mobile device management from the big stick approach that tries to manage employee personal devices to the more granular mobile application management. Wired had an article on MDM vs. MAM and said, “taking a command-and-control approach to managing mobile devices that are typically owned by employees has turned out to be a misguided strategy.”

The 7 Top Microsoft Intune Features

Microsoft Intune is part of the Enterprise Mobility and Security Suite, which provides mobile device management (MDM) and mobile application management (MAM) in the cloud. Microsoft Intune helps businesses manage all of the devices accessing their network while controlling access to corporate data and improving IT security.

This article will look at Microsoft Intune features to provide you with an understanding of how to best use this tool.

Office 365 e3 vs e5: What Makes Sense For Your Business?

IT has a tough job these days. It’s caught between users that want easy access and the necessity of protecting data from encroachment in an ever-widening network where personal devices are seeking access just as frequently as an in-house desktop.