Summarizing Digital Defense Reports for 2024

Recent reports paint an alarming and complex cybersecurity landscape, from technical debt to social factors like workplace reorganization. Navigating this shifting environment may feel like playing whack-a-mole. With 68% of breaches occurring due to human error this year alone, adversaries are leveraging modern technology and psychological techniques to exploit security measures. Microsoft Digital Defense Report […]

Cloud Identities and Security

Cloud environments bring enterprises unparalleled flexibility and power, but they also introduce increased complexity and new security requirements. Identity context has become essential to both prevention and detection. Your identities serve as gatekeepers to your cloud environment—failing to secure them would be like leaving its drawbridge unguarded, inviting attackers inside. Hybrid Environments Hybrid work environments […]

Zero Trust and Putting Identity First

Creating an Identity Zero Trust Strategy Establishing an Identity Zero Trust strategy ensures that security measures align with business priorities. Create an Identity Zero Trust strategy from the outset to ensure your organization’s security measures align with business priorities. Outlining goals and expected results can help gain buy-in from key stakeholders along the way. Integrate […]

A Cybersecurity Close Call: How We Detected and Contained the Threat

This blog post outlines what could have been a devastating ransomware attack, but became a success story thanks to the power of preparation, coordination, and expertise from our team, who work remotely across multiple shifts to provide round-the-clock protection for clients as a Managed Security Services Provider (MSSP).

January 2025 Newsletter

Check out the latest updates from Microsoft and Hybrid Datacenter, along with upcoming events, blog posts, and more from eGroup Enabling Technologies.

Implementing CISA’s SCuBA Project In Your Cloud

This blog post outlines two Microsoft configuration baseline documents that CISA published and introduces an automated assessment tool called ScubaGear to analyze GWS tenant configurations against these baselines.

December 2024 Newsletter

December 2024 Newsletter Table of Contents Wrapping up 2024—and Looking Ahead to 2025 As we close out the year, it’s the perfect time to reflect on the IT news stories that shaped the industry. From groundbreaking advancements in artificial intelligence and cloud computing to escalating cybersecurity challenges and new technologies, 2024 has been a year […]

Use Purview DLP Simulation Mode to Understand PII Risks

Use Purview DLP Simulation Mode toUnderstand PII Risks In most organizations, the end of the year is a unique time. People are scrambling to balance taking time off, finishing projects, enrolling in the new year’s benefit plans, preparing for tax reporting, and performing year-end administrative tasks. Many of these events involve sharing or processing more […]

What Should I Do with These DLP Alerts, Anyway?

What Should I Do with These DLP Alerts, Anyway? Today I am going to address a common tactical and process challenge that comes up when working with clients implementing Data Loss Prevention policies: How are DLP alerts handled? Also, who performs triage, investigation, and resolution? DLP alerts are unique. They can be an indicator of […]

Maximize the Value of Your Microsoft 365 Investments at Renewal Time

Maximize the Value of Your Microsoft 365 Investments at Renewal Time Whether you have an upcoming renewal or are looking to expand your capabilities with Microsoft productivity and security, you want to get the most out of your investments. Maximizing value means addressing several things: Identifying the solutions that are the right fit for your […]