GenCare

Covid-19 and Security: What’s Changed?

What’s the landscape for security in the Work From Home (WFH) era or Covid-19 While the basics of security and the threats have not changed much, the landscape has changed significantly.  While most organizations are not working from the office, the normal situation of “build a security wall” and put important resources behind it is […]

Microsoft, Google and Apple all agree: Use Multi Factor Athentication (MFA or 2FA)

“When both Google and Microsoft are recommending the same thing, it’s probably a good time to start following their advice.” – ZDNet With the “big 3” in agreement, it’s time to listen.  Apple no longer makes it optional.   Microsoft says it stops 99.9% of hack attempts and requires it for any Microsoft Partner with […]

[Policy Template] Should Failing Phishing Tests Be a Fireable Offense?

Thanks to KnowBe4 for this great policy tip! Firing employees for failing phishing tests can be extremely counterproductive and can damage an organization’s overall security posture. That, at any rate, is what two security experts told Brian Krebs recently, and we agree with them. Companies sometimes think punitive policies will make employees take phishing more […]

Using Multiple Cloud Apps? Secure all your data with Cloud App Security

General Networks can help you secure multiple cloud apps with Microsoft Cloud App Security!  Check out this video Microsoft Cloud App Security is a Cloud Access Security Broker (CASB), powered by a unique approach to deliver state-of-the-art security for multi-cloud environments, via native integrations. It is designed with security professionals in mind – providing simplicity […]

INFO: Five steps to secure your identity infrastructure in Azure Active Directory

by kurtsh This document will help you get a more secure posture using the capabilities of Azure Active Directory by using a five-step checklist to inoculate your organization against cyber-attacks. This checklist will help you quickly deploy critical recommended actions to protect your organization immediately by explaining how to: ·         Strengthen your credentials. ·         Reduce […]

  • 1
  • 2