Michael Fraser, CEO of Refactr and frequent contributor, is back for a lightening round update concerning security in Office 365. Topics this month include:
• Restriction of physical data center access.
• Ability to encrypt data at rest and over the network – a security nugget
• No mining of data for advertising purposes
• Regular data backups behind the curtain going on all the times (So do you need a third-party backup solution? The answer will surprise you!)
And much more in the interview (six more points)
Contributor Kew Dwight offers a deeper dive on MSPs as security targets by the “bad guys.” The whole point is that MSPs have been identified by ransomware hackers as attractive targets. This conversation with Dwight is based on his recent article on the same topic at MSP Insights. Spoiler alert – MSPs, as a channel (one to many clients) are just to juicy to the criminal elements. This interview has meat on the bones!
Contributor Alex Fields, on to watch on the way up, has a heart. Much of his writing and analysis beyond his day job as an MSP engineering-type, concerns helping other MSPs and IT Pros be successful. It’s a winning formula as he builds his professional reputation (and you should imitate him!).
Now the good stuff – We review a recent content piece Alex wrote at his ITProMentor site called “Introducing the Office 365 Email Security Checklist” . We discuss the different steps – watch!
Esteemed IT analyst Frank Ohlhorst weighs in on Azure. He shares a couple important points starting with Azure evolving as a service (more and more capabilities are being added all the time). About two minutes into the interview, Ohlhorst proclaims that there is a new focus on small and medium business (SMB) with Azure. Do you believe it or not? Watch and decide for yourself. Ohlhorst asserts that Office 365 Business SKU included elements that allow you to leverage Azure (e.g. instead of just the traditional one drive integration).
A new twist on security conversations with these topics. Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies. It’s a burgeoning menace that can take over web browsers, as well as compromise all kinds of devices, from desktops and laptops, to smart phones and even network servers.
Like most other malicious attacks on the computing public, the motive is profit, but unlike many threats, it’s designed to stay completely hidden from the user. To understand the mechanics of the threat and how to protect yourself against it, let’s begin with a bit of background.
Formjacking is a relatively new form of digital information theft caused by hacker attacks on commercial websites involved in banking, e-commerce and other activities that collect customers’ personal information.
Did you know that Microsoft 365 Nation contributor Ken Dwight is a published author? Dwight wrote a book (“Bug-Free Computing”) a decade ago that still has legs. Dwight shares for the first time that he wasn’t thrilled by the title (he wanted to have “safety” in the title). Back in the day, it was a best-selling book before the term malware was coined and widely used.
While this book reflects the world from a user point of view. Dwight goes deep in KLEZ, the first virus to extract money from afflicted parties. Dwight and myself (Harry) talk about what’s its like to self-publish a book.
Long-time managed services provider (MSP) Karl Palachuk discovers the three workloads of Microsoft 365. Interviewed at the recent ChannelPro SMB Forum in Chicago, Palachuk offers ways he can help MSPs figure out how to tweak the Microsoft 365 experience.
This contribution from Michael (MickyJ) Jenkin is very special. It’s a case of while the cat is away; the mice will play! Jenny and MickyJ filmed the rogue conversation while harry was gone. The content is a solid and the new format is worth the view alone!
The always engaging Microsoft 365 Nation contributor Joshua Liberman is back with a view of the next security frontier(s) you’ll encounter in 2019. First up is internal vulnerability scanning. Second is device alerting. When Liberman speaks, people listen! In this interview he walks the viewer through the “processes” surrounding the above messages such as vulnerability scanning.
Because Microsoft 365 Nation is an independent community separate from Microsoft, Liberman takes advantage of the opportunity to recommend third-party solutions. Just after minute three, Liberman talks about outsourced firewall log reading.
This segment is a doozie – and there’s a free Microsoft 365 book on the other end of this video. Author Alex Fields, Success Computer Consulting, has written an amazingly technical book titled “Microsoft 365 Business Admin Guide” that we quickly do an overview of parts of the book (with this month’s contribution – future months will be a deep dive).
The parts of the book that we discuss are:
1. Identity Management (e.g. Azure Active Directory)
2. Device Management (e.g. Intune)
3. Apps and Data Protection (this is the combo section that brings together the three legs of Microsoft 365). Spoiler alert – we discuss HIPAA
The proverbial lost opportunity appears to have been found. Forever and a day, smart minds have struggled with how to right size Azure consumption for small businesses. Michael and Zack have done exactly that an a SMB Azure solution that is purpose built and already in production and deployed. Amongst all of our content, this is a top five interview and a must view.
Many companies – Windows Autopilot is a modern ways for device deployment…in Andrew’s words “…it’s pretty cool.” In this deep dive, we look at three main stages in the Windows Autopilot Process: (1) Purchase (Vendor), (2) Set-up (Administrator) and (3) User receives devices (End User). There is a brain teaser at the start of the second minute in the interview: how is the device ID created? You’ll just have to watch to gain insights into the and much more.