AMTRA SOLUTIONS BLOG

Articles, news and insights from the AMTRA team.

Deprecation of Basic Authentication in Exchange Online

September 12, 2022
|

Did you know that as of October 1, 2022, Microsoft is deprecating Basic authentication in Exchange Online? Check out the full announcement from Microsoft. In simple terms, this means that Microsoft will remove the ability to use Basic authentication in Exchange Online for Exchange ActiveSync, POP, IMAP, Remote PowerShell, Exchange Web Services, Offline Address Book, Outlook for Windows, and Mac.

Read More

IT and Security Teams Need to Work Together to Improve Security

August 31, 2022
|

For executives in the IT and security spaces, the current work climate offers reasons to worry. As workers begin to move between their home and remote offices, challenges will present themselves. Users want instant access to their corporate assets - without the inconvenience of arduous security protocols or compromised security.

Read More

The Anatomy of a Security Breach

March 31, 2022
|

Did you know an attacker can be present on a network for more than 200 days before being detected? Or the rate of cybercrime increased by 600% during the COVID pandemic? And that the total cost of all cybercrime damages in 2021 is expected to reach about $6 trillion worldwide?

If you think those are alarming statistics, imagine what can happen to your organization during a cyberattack? Sensitive employee and client information could be compromised, operating systems altered, and proprietary information exposed. The damages to your organization ... and reputation could be irreparable.

Read More

A Zero Trust Approach to Security

January 21, 2021
|

With cyber security, the goal has always been simple – to maintain safe and stable business operations. While this goal may seem simple, the journey to get there is not always easy.

Evolution of Security
Way back when, security seemed so much easier. In the good old days, everything lived behind a firewall, within a corporate network. In the early 2000’s, access was granted through secure virtual private networks. This security revolved around the notion of ‘trust but verify.’

Read More

Enabling Remote Work

December 3, 2020
|

Work is what you do, not where you go.

It almost goes without saying that the way we work will never be the same again. For business and technology leaders, the challenge is to find ways to achieve resilience. To meet this challenge, companies need solutions that elevate their workers’ experiences and productivity, securely from anywhere. They need to figure out:

  • How do we help our employees work more effectively?
  • How do we make it easy and reliable to access enterprise tools and content from anywhere?
  • How do we enable workers to connect with each other and access relevant data?
  • How do we introduce and encourage a unified approach to deploying and using productivity tools?
  • How do we protect our employees, data and infrastructure from increased security threats and vulnerabilities, while working remote?
Read More

Securing Windows Virtual Desktop

November 27, 2020
|

IT leaders and security professionals are under increased pressure to keep everyone productive and connected, all while preventing evolving threats.

With Windows Virtual Desktop, you can deliver a full Windows experience to your workers, whether on-premise or remote, through the cloud. 

Although setting up a Virtual Machine host for Windows Virtual Desktop may easy, factoring in security takes more time. To help select and configure the proper security controls for your company, we’ve come up with some best practices for securing Windows Virtual Desktop.   

Read More

The Multi-Factor Authentication 'Factor'

November 19, 2020
|

Microsoft has found that Multi-Factor Authentication (MFA) blocks 99.9 percent of automated cyberattacks on Microsoft platforms, websites, and other online services. As hackers continue to target user credentials and email accounts, we must be mindful of what we’re doing to protect ourselves.

But how do we bolster our defenses and employ better access controls? And what can we do to improve the security posture of our organization?

One defense to consider is Multi-Factor Authentication, which can be used to prevent a hacker from gaining full access to a network, even if a user's credentials become compromised.

Read More

Making your devices work for you

October 29, 2020
|

In some ways, our workplace devices are our favorite co-workers. But, if you’re not careful, they can also expose you to serious threats.

Like a lot of people, I have a love-hate relationship with my devices. They do so many things well like keep us productive and collaborative … yet they could expose us to dangerous risks.

Read More

Remote work security checklist | Is your business protected?

October 15, 2020
|

As organizations adapt to, and even embrace remote work, enabling productivity without sacrificing security is more important than ever.

Companies need to find ways to allow location flexibility, while also keeping data safe. Though there’s a lot that’s done on an infrastructure level to keep customer data secure, the truth is your company’s data is only as secure as the weakest individual link. Basically, as long as your devices are online, you’re at risk.

Read More

Which Collaboration Platform is Best for Your Business?

April 13, 2020
|

Does the prospect of choosing a collaboration platform seem overwhelming to you? Don’t worry, you’re not alone. Many people wonder, with so many options on the market, where do you start?

Read More
Content not found