Why are Microsoft, the NIST and the Department of Homeland Security Recommending New Password Policies for 2019?
Complex passwords policies have proven to do more harm than good, resulting in users creating easy to remember passwords that are even easier to hack! The Verizon 2019 Data Breach Investigations Report confirms that hackers are taking full advantage, revealing that hacking is the #1 cause of data breach in 2019. The report identifies phishing and the use of stolen credentials (passwords) as the top 2 hacking techniques used is successful data breaches.
Microsoft, The National Institute of Security Technology (NIST) and the US Department of Homeland Security have drastically changed their recommendations for strong password policies. Let's look at their new recommendations, and how to implement these changes in your organization.
2019 Password Policy Recommendations,
cybersecurity best practices,
Password Policy Best Practices,
cloud security best practices,
password policy recommendations
Business Owners need to figure out how to use technology to stay relevant in a rapidly changing, modern workplace. Following is a list of the 2019 Top 6 benefits of Office 365 for Business, as well as the most compelling reasons that Office 365 for Business now has over 155 Million users at the end of 2018, and millions more adopting this suite of business productivity apps every month.
office 365 benefits,
benefits of office 365,
Office 365 for Business,
office 365 benefits for business,
what are the benefits of office 365,
benefits of office 365 for business
Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening! My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.
HIPAA Risk Analysis
This week I’ve been working with a small company, coming up with solutions to their rather unique business problems. They have operated for a very long-time as a “paper only” shop. I was surprised to see paper based businesses still existed, but I have a feeling there are many more out there than I am currently aware of. I have been working in I.T. for more than 25 years, and just figured everyone in my world was using technology for work, but that is not the case! Showing a small business owner how technology can help them grow their business is really exciting, and creating a cloud environment allows us to address their goals, allowing them to work in ways they never imagined.
benefits of office 365,
move your business to the cloud,
Benefits of Cloud Computing
The AP reported a few weeks ago that a team-issued iPad was stolen from the car of a Chicago Bears Rookie, and the Bears Playbook was on the iPad! Fortunately, the Bears Organization had implemented a corporate owned device policy, which allowed the IT Department to take control fast.
Mobile Device Management,
corporate owned device policy,
Cisco's Talos threat intelligence group has reported that VPNFilter malware is more dangerous than initially thought. The FBI is urging the public to take steps to protect against VPNFilter and improve router security. We step you through the 5 actions you need to take now.
Microsoft Corp. and TruGrid (N.E. Desktop Software, Inc.) announced on April 3, 2018 that they have entered into a license agreement to enable access to Microsoft's Remote Desktop Protocol (RDP) technology for TruGrid's Simple & Secure Workspace, hosted in Microsoft Azure.
Secure remote access,
Protect your data in the cloud,
Remote access security
February 2018 OCR Cybersecurity Newsletter - Phishing
Phishing remains one of the most successful tactics used by hackers to steal sensitive information such as usernames, passwords, and credit card details. In phishing attacks, cyber-criminals disguise emails to make the recipient think it is from someone they trust, and The Department of Homeland Security warns that 97% of people can not identify a phishing attempt. Read the following IT security tips from the OCR to learn the best cybersecurity strategies to prevent a phishing attack.
prevent a phishing attack,
The key to increasing productivity with Office 365 is to take advantage of the new features being added every month. This helpful infographic from Microsoft is a fast way to learn the latest Outlook productivity hacks!
Microsoft Outlook Productivity,
Quickly Learn 5 Exciting New Word Features
Increasing workforce productivity is a top goal for many businesses, and this new infographic from Microsoft will help Office 365 and Word 2016 users quickly adopt the newest Word features that will make the greatest impact on their productivity. These quick tips will get you started using these time saving features that will increase productivity immediately.
Microsoft Office 365,