Least Privilege and Risk Management

Over the years, Microsoft has published a variety of articles relating to 10 Immutable Laws of Security. One of my favorites was from 2000 - Law #9: Security isn't about risk avoidance; it's about risk management. The two bullets from this are as true today as they were almost 20 years ago.  There will be [...]

By |2019-08-19T12:51:08-05:00August 13th, 2019|Security Solutions|Comments Off on Least Privilege and Risk Management

This Month in Cyber Security: April 2019 (1:54)

This Month in Cyber Security: What are the new risks? New cyber threats emerge on a weekly basis but are all of them relevant to your organization? Each month, our security team will host a 30-minute webinar to discuss the latest threats, breakdown their applicability to small and medium-sized businesses (SMB's), and cost-effective steps to [...]

By |2019-05-03T11:50:14-05:00April 30th, 2019|Security Solutions|Comments Off on This Month in Cyber Security: April 2019 (1:54)

Keep An Eye On Your Business Security: Making IT Your Company’s 6th Man

On Wednesday, March 20th, Peters & Associates partnered with Cisco Meraki to share ways IT can be your company's 6th man. The idea of the "IT 6th Man" came from your typical 5-man starting line-up in basketball, with the 6th man being your supporting player - relied on for his skillset or to take the [...]

By |2019-03-25T16:24:05-05:00March 20th, 2019|Collaboration|Comments Off on Keep An Eye On Your Business Security: Making IT Your Company’s 6th Man

Office 365: Modern Workplace Preview (1:58)

In the final installment of our Modern Workplace webinar series we explore Office 365. Office 365 includes many helpful applications, but Word, Excel, Outlook, and OneDrive only scratch the surface of the potential value of Office 365. Discover how you can deploy, support, manage and use Microsoft’s Office platform to help empower your employees and [...]

By |2018-12-27T10:52:06-05:00November 15th, 2018|Collaboration, Office 365|Comments Off on Office 365: Modern Workplace Preview (1:58)

This Month in Cyber Security October Preview (2:39)

New cyber threats emerge on a weekly basis, but are all of them relevant to your organization? Each month, our security team hosts a 30-minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. October was Cyber Security Awareness Month and, as usual, [...]

By |2018-12-18T12:01:03-05:00November 7th, 2018|Security Solutions|Comments Off on This Month in Cyber Security October Preview (2:39)

Windows 10: Modern Workplace Preview (1:53)

In the second entry in our Modern Workplace webinar series, explore how we use Windows as a core part of your productivity platform to empower employees with digital workstyles and protect their data with built-in protections against modern threats. As one third of the Microsoft 365 offering, deploying Windows 10 is vital to boost both [...]

By |2018-12-18T11:44:24-05:00November 6th, 2018|Security Solutions|Comments Off on Windows 10: Modern Workplace Preview (1:53)

Enterprise Mobility + Security: Modern Workplace Preview (2:05)

By helping your organization fully leverage Enterprise Mobility + Security, you can simplify your IT environment by unifying management across all users, devices, apps, and services. Learn how Microsoft safeguards your data and intellectual property with built in security, and how to maximize EMS’s value to small and mid-sized business in our Enterprise Mobility + Security [...]

By |2018-12-18T12:01:16-05:00October 11th, 2018|Security Solutions|Comments Off on Enterprise Mobility + Security: Modern Workplace Preview (2:05)

Auditing firewalls – Tips for wading through the swamp

Tread Lightly and Backup Often Documenting and cleaning up any firewall can seem like a very daunting task and should not to be taken lightly.  Over the years, it is very likely that applications have come and gone from your organization - has anyone gone back through your firewalls and removed the access legacy services [...]

By |2018-12-18T11:10:12-05:00September 14th, 2018|Security Solutions|Comments Off on Auditing firewalls – Tips for wading through the swamp

Cryptojacking the Internet-of-Things

Cryptojacking has been a security problem for businesses for some time now. You probably know that unprotected internet-of-things (IoT) devices also pose a problem for organizations. But, the newest security challenge facing businesses: Cryptojacking malware that leverages unprotected IoT devices. Cryptojacking is an infiltration tactic used by hackers with an expertise in cryptomining. It involves [...]

By |2018-12-18T12:01:39-05:00September 10th, 2018|Security Solutions|Comments Off on Cryptojacking the Internet-of-Things

Microsoft Uncovers Large Scale Spoofing Scheme

In this space, we often talk about the tactics that bad actors use to infiltrate organizations, but sometimes it can be difficult to truly grasp the scope of these hacking operations. Microsoft recently uncovered a robust effort to steal the confidential login information of users visiting various political organization websites. This instance was very representative [...]

By |2018-12-18T12:02:01-05:00August 27th, 2018|Security Solutions|Comments Off on Microsoft Uncovers Large Scale Spoofing Scheme