Managing security in Microsoft Dynamics 365 Business Central is one of the most critical—and often overwhelming—tasks for administrators. Giving users too much access to data can lead to errors or fraud, while giving them too little access can prevent employees from performing essential job functions. Whether you’re preparing for an implementation, cleaning up after go-live,… Continue reading Managing Permissions and Security Groups in Dynamics 365 Business Central – Part I
Category: Cybersecurity
Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls
As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls
ArcherPoint’s Ten Most Popular Blogs of 2024
As a leading Microsoft partner specializing in implementing and upgrading Dynamics 365 Business Central, we try to support the community with blog content that informs and explains. This year, ArcherPoint team members have been super busy with content covering topics such as security, reporting, upgrades, and much more. We close out the year with our… Continue reading ArcherPoint’s Ten Most Popular Blogs of 2024
Understanding the Benefits of Internal and External Cybersecurity Risk Assessments
Businesses face many cybersecurity threats, ranging from ransomware attacks to sophisticated phishing schemes. The cost of a cyberattack can extend far beyond financial loss, including an adverse impact on the company’s reputation and brand, the imposition of regulatory fines, and an erosion of customer trust. One effective strategy for identifying and mitigating these risks is… Continue reading Understanding the Benefits of Internal and External Cybersecurity Risk Assessments
Top Security Threats and Solutions for Cyber Monday
Cyber Monday has become one of the most anticipated shopping events for shoppers and retailers. However, the surge in online activity also makes Cyber Monday a prime target for cybercriminals. Threats like phishing, data breaches, and fraud spikes highlight the need for robust security measures. While the advice might seem repetitious, it is always a… Continue reading Top Security Threats and Solutions for Cyber Monday
Cybersecurity Roundtable: What’s Coming in 2025
With the surge of cyberattacks and increasing government regulations, it’s clear that cybersecurity will be a top concern for businesses of all types and sizes in 2025. Driven by regulatory pressures and supply chain requirements, next year will likely see SMBs (Small – Medium-sized businesses) investing in cybersecurity measures more proactively. We asked a panel… Continue reading Cybersecurity Roundtable: What’s Coming in 2025
How AI Has Changed the Cybersecurity Landscape
Artificial Intelligence has made a permanent impact on the cybersecurity landscape. AI can perform tasks much faster than humans and can adapt to emerging threats through machine learning (provided it is regularly updated with recent threat data). However, this ability to adapt benefits both security teams and threat actors. So, while AI provides more tools… Continue reading How AI Has Changed the Cybersecurity Landscape
Identify Threat Actors that Use Azure Storage Tools to Ransom Sensitive Data
The blog post “Highway Blobbery: Data Theft Using Azure Storage Explorer” (ModePush, 2024) highlights how threat actors exploit legitimate tools like Azure Storage Explorer and AzCopy for data exfiltration. Attackers leverage these tools to transfer large datasets from compromised environments, often bypassing traditional detection methods. Understanding Azure Storage Explorer and AzCopy Azure Storage Explorer is… Continue reading Identify Threat Actors that Use Azure Storage Tools to Ransom Sensitive Data
The CrowdStrike Outage: What Happened and Lessons Learned
CrowdStrike is a leading cybersecurity company that provides cloud-based endpoint protection, threat intelligence, and incident response services to companies of all sizes worldwide. On July 19, 2024, CrowdStrike uploaded a flawed update to its Falcon Endpoint Detection and Response (EDR) software. The problem caused Windows devices to display Microsoft’s “Blue Screen of Death” (BSOD). In… Continue reading The CrowdStrike Outage: What Happened and Lessons Learned
It’s Cybersecurity Awareness Month. Do You Know Where Your Passwords Are?
The combination of username and password alone, the standard for online security for decades, has shown that it is woefully inadequate to combat cyberattacks. Passwords are easily compromised Passwords alone are insufficient for protecting sensitive data primarily due to users’ lack of security hygiene and aggressive attacks by cybercriminals. The common problem in these situations… Continue reading It’s Cybersecurity Awareness Month. Do You Know Where Your Passwords Are?