Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud
Category: Microsoft Dynamics
Password Security and Protection Has Never Been More Important
How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important
Remaining Vigilant: External threat detection with OSINT
For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT
Phishing, Quishing, Vishing, and Smishing
Just when you thought it was safe to go back in the water… Most people are familiar with the term “phishing,” which describes emails sent by malicious hackers to coax the email recipient (the victim) into clicking on a link that asks them to divulge personal information or login credentials. Sometimes, the victim’s computer is… Continue reading Phishing, Quishing, Vishing, and Smishing
How to Respond to a Ransomware Attack – A Framework for Companies
Ransomware attacks can have devastating consequences for an organization. Some companies could not retrieve all their lost data, even after paying the ransom (let’s face it, attackers do not set up a support team to help you get your data back once they have your money!). Others have been met with subsequent ransom demands from… Continue reading How to Respond to a Ransomware Attack – A Framework for Companies
Comparison Chart: Dynamics 365 Business Central vs. D365 Finance + SCM
Microsoft has discontinued its support of all versions of Microsoft Dynamics AX, meaning there will be no new features or security updates to the software. Since there is no “next version” of AX, companies must replace AX with a completely new ERP system. Companies migrating from Dynamics AX but desiring to leverage the benefits of… Continue reading Comparison Chart: Dynamics 365 Business Central vs. D365 Finance + SCM
Protecting Your Cloud Applications from Unauthorized Access
Most businesses are running at least one of their critical applications in the cloud, such as their ERP, CRM, or Payroll. This takes advantage of many of the efficiencies of cloud apps: lower maintenance costs, automatic updates, and anytime/anywhere access. While the large application hosting providers offer robust security features, it is still important for… Continue reading Protecting Your Cloud Applications from Unauthorized Access
Understanding the Potential Risks of Google’s New Domains
In May 2023, Google introduced two new top-level domains (TLDs), .zip and .mov. While the introduction of new domains and unique branding opportunities can be exciting, it’s essential to understand the potential dangers that may arise from the use of Google’s new domains. New opportunities, new threats One of the primary concerns with Google’s new… Continue reading Understanding the Potential Risks of Google’s New Domains
Microsoft Adds Cybersecurity Protocols with New Granular Delegated Admin Policy
ERP partners are always trying to identify continuous improvements for clients, such as adding more functionality, optimizing workflows, and offering new cybersecurity tools or processes. In the area of cybersecurity, so much is changing. New cybersecurity protocols like the Zero Trust Framework are emerging, and Microsoft is acting on these approaches to make its environments… Continue reading Microsoft Adds Cybersecurity Protocols with New Granular Delegated Admin Policy
Debunking Myths Surrounding an Upgrade to Microsoft Dynamics 365 Business Central
In 2022, businesses are pursuing new revenue streams and launching multiple initiatives throughout the year, and having a granular understanding of new ERP software platforms can be a challenge for medium-sized companies. Furthermore, companies are sifting through misinformation or industry myths that have been perpetuated for years about ERP upgrade projects to Microsoft Dynamics 365… Continue reading Debunking Myths Surrounding an Upgrade to Microsoft Dynamics 365 Business Central