Zero Trust FAQs – Summary of Three Webinars with Microsoft

Zero Trust FAQs – Summary of Three Webinars with Microsoft eGroup | Enabling Technologies and Microsoft completed a trilogy of webinars on Zero Trust. Several questions were covered live, but due to time constraints, this blog reviews and answers all that were asked. The blog also reviews the survey data from our attendees, which show […]

Make Security and Compliance Your Priority

Make Security and Compliance Your Priority Do You Think About Security? You run IT for your organization. You have a small team, maybe not in management’s eyes, but certainly in yours. It’s you, an infrastructure specialist, somebody managing the network, and another body managing your Office 365 tenant. You find that you are just keeping […]

7 Simple Ways to Improve Your IT Security Right Now- With No Money

7 Simple Ways to Improve your IT Security  Right Now… With No Money!      1: BETTER SPAM PROTECTION (FREE) Email is still the primary attack vector, where users receive emails with suspicious attachments or links, unknowingly execute these items, and then – *BAM* – a bad day ensues. If you aren’t protecting your email from spam, […]

Recovering from Enterprise Phishing Attacks

Recovering from Enterprise Phishing Attacks Much has been written about what consumers should do if their home accounts get phished. But here’s a comprehensive list for recovering from enterprise phishing attacks. We include advice for all affected parties: users, IT admins, and Security leaders. For the End User: Immediately tell the IT department and share […]

How Secure is Your Environment?

Most companies today understand the very real need to protect their data. Most invest significant funds to mitigate or prevent the threats that aim to compromise their data. Typically, the go to investment is a firewall on the edge of the network to protect against outside attacks. And that is a great start. But that […]

Cisco FirePOWER: The Answer to Your Security Needs

In today’s network data center environment, it’s not simply enough to have a traditional firewall in place protecting the network’s edge. With more sophisticated network intrusions occurring daily, a Next Generation Firewall (NGFW) is required to help fight against these intrusions. Cisco’s FirePOWER services provides a Next Generation Firewall (NGFW) and IPS (NGIPS) along with […]

How Strong are Your Passwords?

Recently, I learned of a significant – and honestly quite brilliantly executed – security breach of a major company. The breach infiltrated a sophisticated system secured with some great security equipment. This company invested large sums of money to make their system very secure, and they accomplished that. But the brilliant hackers thought outside the […]

7 Common Sense Security Practices IT Administrators Should Implement Now

Given the recent rash of publicity around high-visibility ransomware attacks, it was inevitable that the spam-o-matic would kick in to high gear with just about every manufacturer and security partner out there wanting to offer up heavily funded solutions to address the risk. At eGroup, we believe there is value in sharing for the common […]