Ransomware Attacks on Azure AD & MS 365

Understand the major security concerns in Azure AD and MS365- Explore Microsoft’s built-in security options. For a long time, Active Directory (AD) has been the default way of managing resources in organizations. As its protocols are widely known, it has remained the prime target of ransomware attacks. However, organizations are shifting to advanced cloud applications…

How Should You Define Active Directory Health?

Let’s admit it! Active Directory health check is a challenge – no matter the company size. Symptoms of Poor Active Directory Health The first indication that your organization’s Active Directory isn’t healthy is when a flood of calls comes to the help desk indicating a potential crisis is brewing. Active Directory works okay even when…

Anonymous Hacker

5 Reasons Why Cyberattackers Love AD Groups

Current research regarding cyberattacks shows that hackers target Groups in Active Directory, Azure AD and Office 365. Why are groups so attacker-friendly? The CrowdStrike 2019 Global Threat Report discusses how long it takes for attackers that have compromised a single endpoint to move laterally within your network. The Russians have the best average time at a little…

Active Directory Group Management

Is Just In Time Too Much Time?

There has been a lot of talk over the past few years on Just In Time provisioning. That is, using an SSO (Single Sign On) platform to create nearly real-time accounts in web-based applications the first time they are used. This increases productivity and reduces the amount of work required for IT workers to create…

0 percent trust security

Why Zero Trust Security Requires Group and Identity Management

The latest trend in security – Zero Trust Security – demands a “never trust, always verify” approach. At the heart of this approach is the requirement that the configuration of identity and associated assigned security is 100% correct. Without this in place, Zero Trust is protecting an insecure environment. If you’re new to Zero Trust,…

office 365

Managing Microsoft 365 (and Office 365) Groups in the Enterprise

The shift to the cloud has many organizations focused on the productivity features available in a given cloud suite. And M365 is no exception. There’s a long list of applications in M365 – a list that’s continually growing. But, Using M365 isn’t just about productivity; it’s also about security and control for IT.  And, like…

Microsoft azure

Directories, How Many Are You Really Managing?

Directories, How Many Are You Really Managing? Directories came from a simpler time – one where a single, on-premise directory was enough. But recent shifts in how businesses leverage technology – such as the digital transformation, and the move to cloud-based applications and infrastructure –  have given way to use of SSO (link), concepts like…

Resetting Passwords using Linked Accounts

Passwords are one of the most insecure security measures today. The same passwords are listed as the most used year after year (which is simply a repercussion of too many systems/passwords), and when they’re forgotten, password resets via the helpdesk have zero validation around who’s actually calling. To simplify the process of password resets, self-service…

The Value of Granular Password Management

In a recent article, we discussed how Password Self-Service (PSS) needs to be managed with a degree of granularity. The basis for this argument is that users with varying levels of elevated privileges should be protected with additional layers of complexity and scrutiny. This allows an organization to ensure appropriate levels security are enforced based…

External Authentication

The Password is (Almost) Dead: Protecting Identity with External Authenticators

In a world where organizations need to implement layers of security to protect themselves from the dangers of external attacks, it becomes more and more important to know someone is who they say they are – often on an on-going basis.  Compromised credentials via successful malware attacks make even the most trusted of users a…