<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>Blog | Sentrix Security</title>
    <link>https://www.sentrixsec.com</link>
    <description />
    <atom:link href="https://www.sentrixsec.com/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>How to Ransom-Proof Your Storage and Backups</title>
      <link>https://www.sentrixsec.com/managed-it-services/how-to-ransom-proof-your-storage-and-backups</link>
      <description>Worried one ransomware attack could cripple your entire organization? Read on.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware-Proofing your Storage and Backups
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a08b4205/dms3rep/multi/pexels-photo-430208.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                             Ransomware attacks are a growing menace, with the global cost of ransomware predicted to exceed $20 billion in 2023—a staggering increase from just $325 million in 2015. As an IT manager, the pressure is on to ensure your organization’s data is secure and recoverable in the face of such threats. One of the most effective ways to defend against ransomware is by implementing a strong backup and storage strategy. Below, we explore six key strategies to ransomware-proof your backups and storage, along with the reasons why these steps are crucial in protecting your organization.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Implement the 3-2-1 Backup Strategy
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The 3-2-1 backup strategy is a foundational approach in data protection, and for good reason. It involves keeping three copies of your data—two on different media and one offsite. This method drastically reduces the risk of total data loss, even in the event of a ransomware attack.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Why it works:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware often seeks to encrypt or destroy accessible data, but by having multiple copies stored across different platforms, you create layers of redundancy that make it difficult for ransomware to affect all your data at once. The offsite backup is particularly crucial because it protects your data from local threats, whether they be ransomware, natural disasters, or hardware failures.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stat Insight:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           According to a survey by Datto, 90% of MSPs reported having clients that suffered ransomware attacks in 2021. However, those with the 3-2-1 strategy in place were able to recover data significantly faster and with less impact on their operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Air-Gapped Backups
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Air-gapping is the practice of isolating a backup from your network, ensuring it remains inaccessible to ransomware that spreads through network connections. This can be achieved by physically disconnecting the storage media or using removable media that is only connected when backups are performed.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Why it works:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware often spreads quickly through network connections, targeting all accessible files and backups. An air-gapped backup is effectively invisible to ransomware, rendering it immune to direct attacks. This means that even if your network is compromised, your air-gapped backup remains safe and can be used to restore operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stat Insight:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Studies show that 68% of organizations that paid a ransom still failed to recover all their data. Air-gapped backups can prevent the need to even consider paying a ransom, as your untouched backups allow for a full data restoration.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Immutable Backups
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Immutable backups are backups that cannot be modified or deleted once they are created. Many modern backup solutions offer immutability features, ensuring that your data remains untouched, even if an attacker gains access to your backup system.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why it works:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ransomware attackers often attempt to delete or corrupt backups to force victims into paying ransoms. Immutable backups lock the data, making such tampering impossible. This provides a reliable safety net, ensuring that your data is recoverable without having to engage with the attackers.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stat Insight:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            According to Veeam’s 2022 Data Protection Trends report, 95% of companies had to use their backups after an attack. Immutability guarantees that these backups remain intact, allowing for a successful recovery.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Regularly Test Backups
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It’s not enough to just have backups—they need to work when you need them. Regularly testing your backups by performing full restores ensures that they are not only functioning but also contain the necessary data for recovery.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why it works: Ransomware can be particularly damaging if your backups are incomplete, corrupted, or otherwise unusable. Regular testing verifies the integrity and completeness of your backups, ensuring that your data is fully recoverable in the event of an attack. This proactive approach reduces downtime and ensures business continuity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stat Insight: According to a report by Spiceworks, 27% of organizations that experienced a ransomware attack were unable to fully restore their data due to ineffective or incomplete backups. Regular testing can help avoid this pitfall.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Segment Your Network
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Network segmentation involves dividing your network into smaller, isolated segments, each with its own access controls. This limits the spread of ransomware within your network and ensures that even if one segment is compromised, others remain secure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why it works:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ransomware often spreads laterally across networks, seeking out vulnerable systems and data. By segmenting your network, you create barriers that contain the spread of ransomware, protecting critical systems and backups. This strategy significantly reduces the potential impact of an attack.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stat Insight:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            According to IBM's 2023 Cost of a Data Breach report, organizations with segmented networks experienced 20% lower data breach costs, highlighting the effectiveness of this strategy in mitigating the financial impact of attacks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6. Use Strong Authentication and Access Controls
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware often gains entry to systems through compromised credentials. Implementing strong authentication measures, such as multi-factor authentication (MFA), and strict access controls can prevent unauthorized access to your backup and storage systems.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Why it works:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By requiring multiple forms of authentication, MFA adds an additional layer of security that makes it much harder for attackers to gain access. Additionally, by enforcing the principle of least privilege—where users and applications only have the access they need—you minimize the potential damage if a breach does occur.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Stat Insight:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The 2023 Verizon Data Breach Investigations Report found that 61% of breaches involved credential data. Implementing MFA can block 99.9% of these unauthorized login attempts, significantly reducing the likelihood of a ransomware attack succeeding.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware-proofing your backups and storage is critical to safeguarding your organization's data. By implementing the 3-2-1 backup strategy, air-gapping, using immutable backups, regularly testing them, segmenting your network, and enforcing strong authentication, you create a robust defence that not only protects your data but ensures swift recovery in the event of an attack. As ransomware threats continue to evolve, these strategies provide a solid foundation for maintaining business continuity and minimizing the impact of any potential breach.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Sentrix+Security.png" length="541287" type="image/png" />
      <pubDate>Thu, 29 Aug 2024 20:21:34 GMT</pubDate>
      <guid>https://www.sentrixsec.com/managed-it-services/how-to-ransom-proof-your-storage-and-backups</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Sentrix+Security.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Sentrix+Security.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Actual Cost of a Data Breach - Canada 2024</title>
      <link>https://www.sentrixsec.com/managed-it-services/the-actual-costs-of-a-data-breach-2024</link>
      <description>The dirt on the current cost of breaches or cyber incidents in Canada</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Rising Cost of Data Breaches: A Deep Dive
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a08b4205/dms3rep/multi/sentrix-security-share-image.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the digital age, data breaches have become a common occurrence, causing significant financial and reputational damage to organizations worldwide. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ibm.com/reports/data-breach" target="_blank"&gt;&#xD;
      
           A recent study by IBM has shed light on the escalating costs associated with these breaches
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Global Impact:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.ibm.com/reports/data-breach" target="_blank"&gt;&#xD;
      
           The global average cost of a data breach in the 2024 report was a staggering 4.88 million USD, marking a 10% increase over the past year
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . This rise underscores the growing complexity and impact of data breaches on organizations. According to a
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/#1" target="_blank"&gt;&#xD;
      
           report by Forbes
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , there was a 72% increase in data breaches in 2023, since 2021. 2021 previously held the all-time record for data breaches. This screams that organizations must be prepared and should take all steps necessary to build out the security around their IT infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Canadian Context:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While the global figures are alarming, the situation in Canada continues to concern. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.ibm.com/reports/data-breach" target="_blank"&gt;&#xD;
      
           According to the study, the average data breach costs Canadian organizations a whopping 4.66 million
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            USD (~CA6.32 million). This figure is slightly lower than the global average, but still highlights the urgent need for robust cybersecurity measures in Canadian organizations.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Healthcare Sector - A Prime Target:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           For the 13th consecutive year,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           healthcare
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           data
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           breaches
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           were found to be the costliest, with the average cost increasing to $10.
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           93
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           million
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           This represents a 53.3% increase over the past three years and an 8.22% increase from the $10.10 million average breach cos
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.hipaajournal.com/2023-cost-healthcare-data-breach/" target="_blank"&gt;&#xD;
      
           t in 2022
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The sensitive nature of healthcare data makes it a prime target for cyber criminals, leading to higher costs when breaches occur.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Role of AI and Automation in Mitigating Costs:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs?ref=hackernoon.com" target="_blank"&gt;&#xD;
      
           Interestingly,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            another
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs?ref=hackernoon.com" target="_blank"&gt;&#xD;
      
           study
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs?ref=hackernoon.com" target="_blank"&gt;&#xD;
      
           by IBM
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs?ref=hackernoon.com" target="_blank"&gt;&#xD;
      
           found that organizations that extensively
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs?ref=hackernoon.com" target="_blank"&gt;&#xD;
      
           deploy
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs?ref=hackernoon.com" target="_blank"&gt;&#xD;
      
           security AI and automation experienced significantly lower incident costs
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://newsroom.ibm.com/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs?ref=hackernoon.com" target="_blank"&gt;&#xD;
      
           These organizations also saw 108-day shorter breach lifecycles on average compared to those not deploying these technologies
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This finding underscores the critical role of AI and automation in enhancing cybersecurity and mitigating the financial impact of data breaches.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The rising cost of data breaches underscores the urgent need for organizations to prioritize cybersecurity. By understanding the causes of breaches and the factors that increase or reduce costs, organizations can better prepare for potential breaches and minimize losses. As the study suggests, investing in AI and automation can play a crucial role in mitigating the financial impact of data breaches.
            &#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
        
             Why
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Sentrix:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Coming from an incident response background, our managed services begin and end with the bottom line:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           protecting your company and it's data.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            We understand that much better how to protect against and recover from all kinds of intrusions due to our experience.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.ibm.com/reports/data-breach" target="_blank"&gt;&#xD;
      
           For more insights, you can explore the comprehensive findings from the Cost of a Data Breach Report 2023
           &#xD;
      &lt;sup&gt;&#xD;
        
            1
           &#xD;
      &lt;/sup&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Online+Data+Breach-6b5c9de7.png" length="607601" type="image/png" />
      <pubDate>Thu, 29 Aug 2024 20:06:27 GMT</pubDate>
      <guid>https://www.sentrixsec.com/managed-it-services/the-actual-costs-of-a-data-breach-2024</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Online+Data+Breach-6b5c9de7.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Online+Data+Breach-6b5c9de7.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Work From Home Environment</title>
      <link>https://www.sentrixsec.com/cloud-migration-advisory/the-work-from-home-environment</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Work from Home Environment: A Mental Health and Business Perspective
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The work-from-home (WFH) environment has gained immense popularity, influencing both mental health and business operations. From a mental health perspective, WFH offers flexibility and comfort, reducing stress associated with commuting and allowing for a better work-life balance. Employees can create a personalized workspace, leading to increased job satisfaction and overall well-being. However, the isolation can lead to feelings of loneliness and detachment, potentially affecting mental health negatively.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           From a business perspective, the shift to WFH can lead to significant cost savings. Companies can reduce overhead expenses related to office space, utilities, and in-office amenities. Additionally, remote work often leads to higher productivity as employees have fewer distractions and can work during their most productive hours. However, businesses may face challenges in maintaining team cohesion, communication, and company culture in a virtual environment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Comparing the two perspectives reveals both benefits and challenges. For employees, the primary advantage lies in improved mental health through a better work-life balance and reduced stress. However, the lack of social interaction and potential for overwork can be detrimental. For businesses, the financial savings and productivity gains are significant, but ensuring effective communication and maintaining a cohesive team culture can be difficult.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In conclusion, the WFH environment presents numerous benefits for both employees and employers. For employees, it offers improved mental health and flexibility. For employers, it leads to cost savings and increased productivity. Balancing these advantages with effective strategies to mitigate the challenges can create a thriving remote work environment for all parties involved.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/pexels-photo-4049990.jpeg" length="87502" type="image/jpeg" />
      <pubDate>Sat, 20 Jul 2024 01:49:43 GMT</pubDate>
      <guid>https://www.sentrixsec.com/cloud-migration-advisory/the-work-from-home-environment</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/pexels-photo-4049990.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/pexels-photo-4049990.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Rise of Remote Work and Shifting to Cloud Computing</title>
      <link>https://www.sentrixsec.com/cloud-migration-advisory/the-rise-of-remote-work-and-shifting-to-cloud-computing</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remote work facts:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Workers are 50% happier remote than in-person -
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.forbes.com/sites/markmurphy/2016/01/24/youre-87-more-likely-to-love-your-job-if-you-work-from-home-i-e-telecommuting/?sh=4e1ff704463d" target="_blank"&gt;&#xD;
        
            Forbes
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             16% of global organizations are now fully remote -
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.apollotechnical.com/statistics-on-remote-workers/" target="_blank"&gt;&#xD;
        
            Apollo Technical
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             While nearly a quarter of the American workforce is forecasted to be remote by 2025 -
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.upwork.com/press/releases/upwork-study-finds-22-of-american-workforce-will-be-remote-by-2025" target="_blank"&gt;&#xD;
        
            Upwork
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In recent years, the rise of remote work has significantly changed how businesses operate. This shift, propelled by the COVID-19 pandemic, has shown that employees can maintain productivity from home, prompting many companies to adopt permanent remote or hybrid work models. As a result, businesses are increasingly moving their on-premise computing to the cloud, driven by both necessity and cost efficiency.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The surge in remote work has highlighted the limitations of traditional, on-premise IT infrastructure. Maintaining hardware, ensuring security, and providing access to employees scattered across various locations can be both challenging and costly. This is where cloud computing steps in, offering a scalable, flexible, and cost-effective solution.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud services eliminate the need for substantial upfront investments in hardware and ongoing maintenance costs. Instead, businesses can leverage cloud providers' robust infrastructure, paying only for the resources they use. This not only reduces capital expenditure but also provides a predictable operating expense, which is crucial in uncertain economic times.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Moreover, cloud computing enhances collaboration and productivity among remote teams. With tools like cloud storage, virtual desktops, and collaboration software, employees can access the same resources and work seamlessly from any location. This ensures business continuity and boosts operational efficiency.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In conclusion, the growing popularity of remote work and the high costs associated with on-premise hardware are driving businesses to adopt cloud computing solutions. This transition not only addresses current operational challenges but also positions companies for future growth in an increasingly digital and remote world.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/pexels-photo-389818.jpeg" length="81593" type="image/jpeg" />
      <pubDate>Sat, 20 Jul 2024 01:28:55 GMT</pubDate>
      <guid>https://www.sentrixsec.com/cloud-migration-advisory/the-rise-of-remote-work-and-shifting-to-cloud-computing</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/pexels-photo-389818.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/pexels-photo-389818.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Configuring MFA on O365 and Azure</title>
      <link>https://www.sentrixsec.com/business-email-compromises/configuring-mfa-on-o365-and-azure</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Setup MFA in Entra (Azure)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 1: Understand MFA
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Multifactor authentication (MFA) is a process in which a user is prompted for additional forms of identification during a sign-in event
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Microsoft Entra multifactor authentication and Conditional Access policies give you the flexibility to require MFA from users for specific sign-in events
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 2: Check Your Role
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           You must be a Global admin or at least a Conditional Access Administrator to manage MFA
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 3: Turn Off Legacy Per-User MFA
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           If you have legacy per-user MFA turned on, you need to turn it off before enabling Security defaults
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           To do this, navigate to the Microsoft 365 admin center, choose Users &amp;gt; Active users, then choose multifactor authentication
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 4: Enable Security Defaults
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Browse to Identity &amp;gt; Overview &amp;gt; Properties. Select Manage security defaults. Set Security defaults to Enabled. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Select Save
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 5: Set Up Admin Accounts for MFA
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           As an admin, once you’ve enabled MFA for your organization, you need to set up your admin accounts to use it
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Log in to the Office 365 admin portal and navigate to Users and then Active users
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-mfasettings" target="_blank"&gt;&#xD;
      
           From the More menu, choose Setup Azure multi-factor auth
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-mfasettings" target="_blank"&gt;&#xD;
      
           Change the view to Global administrators to list the global admin accounts for your tenant
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Check the box for the admin account that you are enabling MFA for, then click the Enable link
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 6: Create a Conditional Access Policy
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Browse to Protection &amp;gt; Conditional Access, select + New policy, and then select Create new policy
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Enter a name for the policy, such as MFA Pilot
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Under Assignments, select the users and groups you want the policy to apply to
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 7: Configure the Conditions for Multifactor Authentication
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Configure the policy conditions that prompt for MFA
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           This could include conditions such as sign-in risk, device platform, location, client apps, and device state
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Policy Condition Considerations:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In Entra, Multi-Factor Authentication (MFA) can be prompted by various policy conditions. Here are some key points:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
        
            Azure Management: MFA is recommended for
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            all users in the tenant with few exceptions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
        
            User Exclusions: Certain accounts are recommended to be excluded from Conditional Access policies
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . These include:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
        
            Emergency access or break-glass accounts: These accounts can be used to log into the tenant to recover access in the unlikely scenario all administrators are locked out
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Service accounts and service principals: These are non-interactive accounts that aren’t tied to any particular user. 
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
        
            They’re normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . 
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
        
            Since MFA can’t be completed programmatically, these accounts should be excluded
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-all-users-mfa" target="_blank"&gt;&#xD;
        
            Application Exclusions: Administrators can choose to exclude specific applications from their policy
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . 
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-all-users-mfa" target="_blank"&gt;&#xD;
        
            For example, the payroll and attendance applications may require MFA but the cafeteria probably doesn’t
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
        
            Creating a Conditional Access Policy: A Conditional Access policy can be created to require users who access the Windows Azure Service Management API suite to do multifactor authentication
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . 
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
        
            It’s important to understand how Conditional Access works before setting up a policy to manage access to Windows Azure Service Management API
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
      
           Remember, it’s crucial to ensure that the conditions you create don’t block your own access to the portal
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management" target="_blank"&gt;&#xD;
      
           Always sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 8: Test Microsoft Entra Multifactor Authentication
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           Test configuring and using multifactor authentication as a user
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           This will help you understand the end-user experience of configuring and using Microsoft Entra multifactor authentication
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           That’s it! 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa" target="_blank"&gt;&#xD;
      
           You’ve now set up MFA for your Microsoft Azure/Entra admin accounts. Remember, setting up MFA adds an extra layer of security to your Microsoft Azure/Entra account sign-in
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           References:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-azure-management
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-policy-all-users-mfa
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://infrasos.com/setup-azure-conditional-access-multi-factor-authentication-mfa/
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://support.microsoft.com/en-us/account-billing/set-up-the-microsoft-authenticator-app-as-your-verification-method-33452159-6af9-438f-8f82-63ce94cf3d29
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://learn.microsoft.com/en-us/partner-center/mfa-for-users
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           -----------------------------------------
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Set up MFA in O365
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 1: Understand MFA
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Multifactor authentication (MFA) is a crucial step in securing your organization. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           It requires users to provide more than one way to sign in, adding an extra layer of security
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           Microsoft 365 for Business allows you to use security defaults or Conditional Access policies to turn on MFA for your admins and user accounts
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 2: Check Your Role
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/"&gt;&#xD;
      
           You must be a Global admin to manage MFA. Sign in to the Microsoft 365 admin center as at least a Security Administrator.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 3: Turn Off Legacy Per-User MFA
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           If you have legacy per-user MFA turned on, you need to turn it off before enabling Security defaults
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . To do this, navigate to the Microsoft 365 admin center, choose Users &amp;gt; Active users, then choose multifactor authentication. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           On the multifactor authentication page, select each user and set their multifactor authentication status to Disabled
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 4: Enable Security Defaults
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Browse to Identity &amp;gt; Overview &amp;gt; Properties. Select Manage security defaults. Set Security defaults to Enabled. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           Select Save
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Step 5: Set up admin mfa
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           As an admin, once you’ve enabled MFA for your organization, you need to set up your admin accounts to use it
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://practical365.com/securing-office-365-administrator-accounts-multi-factor-authentication/" target="_blank"&gt;&#xD;
      
           Log in to the Office 365 admin portal and navigate to Users and then Active users
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://practical365.com/securing-office-365-administrator-accounts-multi-factor-authentication/" target="_blank"&gt;&#xD;
      
           From the More menu, choose Setup Azure multi-factor auth
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://practical365.com/securing-office-365-administrator-accounts-multi-factor-authentication/" target="_blank"&gt;&#xD;
      
           Change the view to Global administrators to list the global admin accounts for your tenant
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           Check the box for the admin account that you are enabling MFA for, then click the Enable link
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 6: Set Up User Accounts mfa
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           Once your admin enables your organization, and your account, for MFA, you have to set up your user account to use it
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Sign in to Microsoft 365 with your work or school account with your password like you normally do. After you choose Sign in, you’ll be prompted for more information. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide" target="_blank"&gt;&#xD;
      
           Choose Next
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 7: Choose Authentication Method
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14" target="_blank"&gt;&#xD;
      
           The default authentication method is to use the free Microsoft Authenticator app
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14" target="_blank"&gt;&#xD;
      
           If you have it installed on your mobile device, select Next and follow the prompts to add this account
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14" target="_blank"&gt;&#xD;
      
           If you’d rather use SMS messages sent to your phone instead, select "I want to set up a different method"
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14" target="_blank"&gt;&#xD;
      
           Microsoft 365 will ask for your mobile number, then send you an SMS message containing a 6-digit code to verify your device
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Step 8: Complete the Setup
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14" target="_blank"&gt;&#xD;
      
           Once you complete the instructions to specify your additional verification method, the next time you sign in to Microsoft 365, you’ll be prompted to provide the additional verification information or action, such as typing the verification code provided by your authenticator app or sent to you by text message
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           That’s it! 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14" target="_blank"&gt;&#xD;
      
           You’ve now set up MFA for your Microsoft 365 account. Remember, setting up MFA adds an extra layer of security to your Microsoft 365 account sign-in
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           References:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://practical365.com/securing-office-365-administrator-accounts-multi-factor-authentication/
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-12376016.jpeg" length="79693" type="image/jpeg" />
      <pubDate>Mon, 15 Jan 2024 14:00:00 GMT</pubDate>
      <guid>https://www.sentrixsec.com/business-email-compromises/configuring-mfa-on-o365-and-azure</guid>
      <g-custom:tags type="string">BEC,Business Email Compromise,Cloud Security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-12376016.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-12376016.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>What is a BEC?</title>
      <link>https://www.sentrixsec.com/business-email-compromises/what-is-a-bec</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is a BEC? Better known as a Business Email Compromise.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                    Business Email Compromise, or BEC, stands as a subtle yet potent adversary within the realm of cyber threats. Unlike the flashy exploits often associated with hacking, BEC operates in the shadows of normalcy, relying on deception and manipulation to achieve its objectives.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                     At its core, BEC is a type of scam where cybercriminals exploit trust and authority. Imagine receiving an email from your CEO or head of finance, or HR, instructing you to urgently transfer funds for a confidential project or, even more common, sign a DocuSign document. The catch? It's not your CEO but an adept impersonator who has meticulously studied communication patterns and organizational hierarchies. Falling for this ruse could lead to the transfer of substantial funds into the wrong hands. In the case of the DocuSign doc, it's usually a fake document when you click "Sign" it will take you to a sign-in page for your email provider, like Outlook for example. Where, as soon as you enter your credentials, the hacker has stolen them and can even bypass MFA.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                     What makes BEC particularly insidious is its simplicity. It doesn't rely on complex malware or sophisticated hacking techniques. Instead, it preys on human psychology and the trust we place in digital communication. By impersonating a trusted figure within an organization, BEC attackers can manipulate employees into unwittingly facilitating financial transactions or divulging sensitive information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                     We have personally witnessed the severity of BEC threats. Companies, both large and small, have fallen victim to these schemes in less than a minute, to an event so trivial that the victim usually forgets in a few minutes which end up resulting in multi-million dollar losses. The simplicity of the attacks serves as a stark reminder that even the most sophisticated cybersecurity measures can be undermined by a well-crafted email. Vigilance, education, and a healthy skepticism towards unexpected email requests as well as a solid plan in every employees mind on the correct way to deal with suspicious mail are crucial in fortifying defenses against Business Email Compromises.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Reach out for more information on how you can prepare your employees for this elusive attack.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-6964348.jpeg" length="651767" type="image/jpeg" />
      <pubDate>Mon, 08 Jan 2024 14:30:00 GMT</pubDate>
      <guid>https://www.sentrixsec.com/business-email-compromises/what-is-a-bec</guid>
      <g-custom:tags type="string">BEC,Business Email Compromise</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-6964348.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-6964348.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Why Small-to-Medium Businesses Need Cloud Integration Solutions</title>
      <link>https://www.sentrixsec.com/cloud-integration-solutions/why-small-to-medium-businesses-need-cloud-integration-solutions</link>
      <description>Discover why cloud integration is essential for small to medium-sized businesses. Learn about its benefits, from scalability to cost savings, and find out how Sentrix Security's expert solutions can help you leverage the cloud effectively.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's digital age, businesses of all sizes are continuously seeking to leverage technology to improve their operations, customer experience, and bottom line. Among the numerous technological advancements available, cloud integration stands out because of its exceptional adaptability and cost-effectiveness. In this blog post, we'll delve into why small to medium-sized businesses (SMBs) should consider implementing cloud integration solutions. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Benefits of Cloud Integration 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Accessibility and Flexibility: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            One of the most significant advantages of
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/cloud-integration-solutions"&gt;&#xD;
      
           cloud integration
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            is the ability to access business data and applications anytime, anywhere. This flexibility is particularly beneficial for SMBs, as it allows their teams to work remotely if needed, enhancing productivity and job satisfaction. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Scalability:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud integration provides scalability that traditional IT infrastructure can't match. As your business grows, so too can your cloud capacity—without the need for costly and time-consuming hardware upgrades.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Reduces Operational Costs:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Owning and maintaining in-house servers can be expensive, both in terms of upfront costs and ongoing maintenance.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/cloud-integration-solutions"&gt;&#xD;
      
           Cloud integration solutions
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , like those offered by Sentrix Security, can dramatically reduce these costs by eliminating the need for physical servers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Enhanced Security:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Despite common misconceptions, the cloud can be safer than traditional IT systems. Sentrix Security employs robust measures to protect your data from cyber threats and unauthorized access, giving you peace of mind.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Improves Collaboration:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud integration facilitates real-time collaboration among teams, irrespective of their locations. By storing files in a centralized location, employees can work together more efficiently.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why Choose Sentrix Security For Cloud Integration Solutions?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As a leading provider of comprehensive cloud solutions, Sentrix Security possesses deep expertise in cloud security and a dedicated support team ready to address any concerns promptly. Our customized solutions cater to your unique business needs, ensuring you remain competitive in today's fast-paced digital landscape.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whether you're seeking to migrate your data, integrate your systems, or safeguard your business from cyber threats, Sentrix Security has the knowledge and experience to achieve your IT goals.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's interconnected world, cloud integration is more than a luxury—it's a necessity for businesses looking to thrive. By leveraging the power of the cloud, SMBs can achieve greater operational efficiency, improved collaboration, and significant cost savings. Partnering with a trusted provider like Sentrix Security ensures you make the most of your cloud journey. Reach out to us today to learn more about our cloud integration solutions and how they can help your business. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ready to take your business to new heights with
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/cloud-integration-solutions"&gt;&#xD;
      
           cloud integration
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ? Request a quote from Sentrix Security today!
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Full+Data+Security-caf0c85c.png" length="387962" type="image/png" />
      <pubDate>Mon, 23 Oct 2023 16:59:53 GMT</pubDate>
      <guid>https://www.sentrixsec.com/cloud-integration-solutions/why-small-to-medium-businesses-need-cloud-integration-solutions</guid>
      <g-custom:tags type="string">Cloud Integration Solutions</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Full+Data+Security-caf0c85c.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a08b4205/dms3rep/multi/Full+Data+Security-caf0c85c.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
