Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.

How to setup Multi-Factor Authentication (MFA)

By setting up MFA, you add an extra layer of security to your Microsoft 365 account sign-in. For example, you first specify your password and, when prompted, you also type averification code sent to your phone. To start the MFA setup process close and re-open Outlook. (if you use the web portal toaccess email simply logout and log back in...
Read More

Making Azure Sentinel work for you

Microsoft Azure Sentinel is the first Security Incident and Event Management (SIEM) solution built into a major public cloud platform that delivers intelligent security analytics across enterprise environments and offers automatic scalability to meet changing needs. This new white paper outlines best practice recommendations for configuring data sources for Azure Sentinel, using Azure Sentinel during incident response, and proactively hunting for threats...
Read More
Featured image for “Top 10 ways to secure Office 365 and Microsoft 365 Business plans”

Top 10 ways to secure Office 365 and Microsoft 365 Business plans

If you are a small or medium-size organization using one of Microsoft’s business plans and your type of organization is targeted by cyber criminals and hackers, use the guidance in this article to increase the security of your organization. This guidance helps your organization achieve the goals described in the Harvard Kennedy School Cybersecurity Campaign Handbook. Microsoft recommends that you complete...
Read More
Featured image for “Microsoft Teams is it secure?”

Microsoft Teams is it secure?

With the recent explosion of Video conferencing usage due to the Covid-19 outbreak causing the sudden increase in remote workers.  Video conferencing has become a hot topic, almost as hot as the discovery of some very serious security flaws in one of the more popular video conferencing systems Zoom. Zoom’s founder has acknowledged the serious security concerns and has promised...
Read More
Featured image for “Zoom security bug lets attackers steal Windows passwords”

Zoom security bug lets attackers steal Windows passwords

Zoom, the video conferencing software that’s skyrocketed in popularity as much of the globe sits at home due to the coronavirus outbreak, is quickly turning into a privacy and security nightmare. BleepingComputer reports about a newly found vulnerability in Zoom that allows an attacker to steal Windows login credentials from other users. The problem lies with the way Zoom’s chat...
Read More
Featured image for “Massive increase in South African network attacks”

Massive increase in South African network attacks

The sudden increase in the number of people working remotely has some security knock on effects. Kaspersky statistics show that a major spike in network attacks took place in South Africa last week. According to these statistics, affected devices increased from 20,000-30,000 to about 310,000 in the period spanning from 15 – 21 March. “The region is seeing an increase...
Read More
Featured image for “Essential Settings for EOP and Office 365 ATP security”

Essential Settings for EOP and Office 365 ATP security

Techtron has been migrating to and managing Office 365 enviroments for some time now.  One of the most common scenarios we find is companies have left many of the security features set to default, which according to Microsoft and other leading experts is not recomended.  These settings are often neglected because everything seems to “just work” out of the box. ...
Read More
Featured image for “Do You Know Who Has Access to Your Systems?”

Do You Know Who Has Access to Your Systems?

This blog gets at a really important topic for businesses, especially smaller businesses that don’t have a lot of extra resources for dealing with IT admin. Using a centralized access control system to make sure your systems aren’t accessible by people who have left your company is really important to overall security. The last time an employee left your business,...
Read More
Featured image for “Stay Ahead of Hackers by Changing Your Passwords”

Stay Ahead of Hackers by Changing Your Passwords

We’re continuing to explore the topic of passwords and how they help keep your business data and systems secure in this next blog on when and how you should update your passwords. An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5! and— Not so fast. Regular...
Read More
Featured image for “Strong Security Starts with Strong Passwords”

Strong Security Starts with Strong Passwords

We have been thinking a lot about client security lately. When we came across this blog series about passwords, we knew we had to share it with all our clients. It’s all too easy to think passwords are a nuisance—when really they’re essential to keeping your data and your business safe. If you use the same password for multiple systems—online...
Read More
Featured image for “Multiple Gaming And Photo Apps On Play Store Found to be Infected With Android Malware”

Multiple Gaming And Photo Apps On Play Store Found to be Infected With Android Malware

Despite back-to-back reports of malicious apps, Google’s Play Store still harbors lots of such applications. Once again, researchers have discovered a bunch of such applications, including gaming and photo apps, that delivered malware to users’ devices. Malicious Gaming and Photo Apps Reportedly, Dr.Web team has discovered another batch of malicious applications flooding the Google Play Store. In their study, they...
Read More
Featured image for “Why Techtron Recomends Microsoft Security”

Why Techtron Recomends Microsoft Security

As a trusted IT and Security advisor for our clients, we constantly watch the security and vendor landscape, looking for the latest best practices, threats and updates from our partners.  Identity driven security has become essential in todays online world.  I have highlighted some of the key aspects of Identity driven security, how Microsoft has adopted the approach and why...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.