Implementing Strong Identity: Identity Protection

In this series of blogs, we are reviewing the best practices in hardening your Microsoft 365 tenant against malicious attacks.  Many attacks can be block by making zero-costs changes to your tenant.  A compromised identity credential, even one with low-level privileges, is all hackers need to gain entry into an organization to begin moving laterally, undetected, to gain access to mission-critical systems and data. Azure AD Identity Protection uses heuristics…

0 Comments

Implementing Strong Identity: Policy-based Access

In this series of blogs we are reviewing the best practices in hardening your Microsoft 365 tenant against malicious attacks.  Many attacks can be block by making zero-costs changes to your tenant. Policy-based Access can decide whether to block access to a requested resource or impose additional requirements, such as MFA, for granting access when risk is detected. Microsoft recommends four requirements for implementing strong identity for a Zero Trust security…

0 Comments

Implementing Strong Identity: Multi-factor Authentication

A recent survey of Microsoft Office 365 accounts found that over 75% have yet to implement MFA. From a cost of security perspective, this is the single most powerful deterrent to hackers available. Very few hacks of IT systems are capable of beating MFA when properly deployed. Also, the user impact of Microsoft's Office 365 MFA is very light. We strongly recommend all IT administrators deploy first to the ADMIN…

0 Comments