Hi, I have begun to reflect a great deal more about the issue of safety and the best way to assist you on the crossing of this Covid-19 crisis. One of the main topics is “which service to use to work from home or to make meetings?” I know some tools such as Zoom, Google Hangouts or Microsoft Teams. In this context, Microsoft Teams (available with Office 365), is Microsoft’s fastest ever growing product. Microsoft is positioning Office 365 as being able to respond to key trends in the Digital Workplace, basically of the Covid-19 crisis: Remote work from anywhere (working from home with Microsoft Teams) and bring your own device (BYOD) and Cloud collaboration. All these points are important but the level of security should not be overlooked. If you are not sure what product to choose, please read this post about Microsoft Teams.
Hi, at the moment, the trend is for VPNs. So much the better because VPN is a best practice (security habit to build), especially in businesses. If your sent all your employees home and they are now struggling with your corporate network access, but you don’t have time or knowledge to build, optimize and maintain your own VPN infrastructure, Veeam PN to the rescue (working from home with Veeam PN Blog Post).
Hi, yesterday, Microsoft has released a patch for a vulnerability in the SMBv31.1 (CERTFR-2020-ALE-008 / CVE-2020-0796) protocol that accidentally leaked online earlier this week during the March 2020 Patch Tuesday preamble. Updates a Microsoft Server Message Block 3.1.1 protocol issue that provides shared access to files and printers. The KB KB455176 is an update for Windows 10, versions 1903 and 1909, and Windows Server 2019, versions 1903 and 1909.
Last week, I had the opportunity to participate in a live session in French as official Speaker Varonis about Security, Data Protection & Governance as Varonis Elite member at SECURE IT DAY 2020 with Pierre-Antoine FAILLY (Security Architect – Varonis). We are seeing an uptick in adversaries using a very tricky Man-in-the-Middle (MitM) attack to bypass MFA and breach Office 365 tenants. So, during the session, we have shown how an attacker obtains access to SharePoint Online using a phishing attack.