Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs
Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs Introduction Admittedly, this title is misleading, but it did get you to look at this article! This is part of our series on securing AudioCodes SBCs based on eGroup | Enabling Technologies’ security mantra of “Trust No One, Harden Everything” and guidance provided by AudioCodes. […]
The Journey to Zero Trust
The Journey to Zero Trust The Zero Trust concept has been around for a while now, and the rise of remote work related to COVID lockdowns supercharged the Zero Trust conversation. Many organizations had to scramble to enable employees to work remotely but did not have technology environments that were prepared for it. As a […]
Improving Cloud Security Policies
Improving Cloud Security Policies Our Strategic Advisors find a consistent gap when reviewing our customers’ security policies: a lack of focus on cloud computing. Even in organizations with many traditional policy documents, there’s a lag in updating them for cloud technologies like Microsoft 365. Additionally, the gap widens when it comes to documenting the standard […]
Compliance as Security Technology
Compliance as Security Technology One of my favorite security analogies is that enterprise information security is like an onion. Each layer of the onion represents a different control that secures the data at the center. Common layers are endpoint protection, mobile device management, MFA, firewalls, encryption, security policies, and staff training. All of these (and […]
New Microsoft Defender Security Tools: MDEASM and MDTI
New Microsoft Defender Security Tools: MDEASM and MDTI Cybersecurity is ever-changing. New attacks and techniques are practically created every day. Organizations are getting more complex with multi-cloud environments. Data is exponentially growing and we are losing visibility into our assets due to poor governance. Last week, Microsoft announced two new Defender solutions as a result […]
How to Fearlessly Implement Your Zero Trust Strategy
How to Fearlessly Implement Your Zero Trust Strategy “Zero What?” So what does Zero Trust mean? Zero Trust has been a term that has been around a long time. Remember the X Files? Agent Molder would always tell his colleagues – “Trust no one”. That pretty much sums it up. You don’t trust anyone who […]
Zero Trust FAQs – Summary of Three Webinars with Microsoft
Zero Trust FAQs – Summary of Three Webinars with Microsoft eGroup | Enabling Technologies and Microsoft completed a trilogy of webinars on Zero Trust. Several questions were covered live, but due to time constraints, this blog reviews and answers all that were asked. The blog also reviews the survey data from our attendees, which show […]
Make Security and Compliance Your Priority
You run IT for your organization. You have a small team, maybe not in management’s eyes, but certainly in yours. It’s you, an infrastructure specialist, somebody managing the network, and another body managing your Office 365 tenant. You find that you are just keeping up with moves, changes, and deletes on O365, keeping Teams in […]
7 Simple Ways to Improve your IT Security

Want to improve IT security without breaking the bank? Here are 7 free ways to protect your business from phishing, ransomware, and cyber threats. From better spam protection and perimeter security to smarter backups and employee training, these simple yet powerful strategies help you lock down your data and stay ahead of attackers. Learn how to implement them now!
Recovering from Enterprise Phishing Attacks
Recovering from Enterprise Phishing Attacks Much has been written about what consumers should do if their home accounts get phished. But here’s a comprehensive list for recovering from enterprise phishing attacks. We include advice for all affected parties: users, IT admins, and Security leaders. For the End User: Immediately tell the IT department and share […]